Guide

Modern Password Policies for 2026

NIST 800-63B changed everything about password policy. No forced rotation. Length over complexity. Password managers encouraged. Here is how to implement modern password policies that actually improve security.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

NIST 800-63B: the password policy revolution

For decades, organizations forced employees to change passwords every 60-90 days, required uppercase/lowercase/number/symbol combinations, and prohibited password reuse. NIST Special Publication 800-63B fundamentally changed this approach — and the evidence supports the change. What NIST 800-63B recommends: 1. No forced periodic rotation — Do not require users to change passwords on a schedule. Forced rotation leads to predictable password patterns (Password1!, Password2!, Password3!). Users choose weaker passwords when they know they will be forced to change them. Only require a password change when there is evidence of compromise. 2. Length over complexity — Require a minimum length of 8 characters (NIST minimum) but encourage passphrases of 15+ characters. A long passphrase like "correct horse battery staple" is stronger than "P@ssw0rd!" and far easier to remember. Do not impose arbitrary complexity rules (must contain uppercase, number, symbol). 3. Check against breached password lists — Screen new passwords against known compromised password databases (Have I Been Pwned, NIST bad password list). Reject passwords that appear in breach databases regardless of length or complexity. 4. Allow all characters — Accept all printable ASCII characters, Unicode, and spaces in passwords. Do not restrict special characters or spaces. 5. No password hints — Password hints and knowledge-based authentication (security questions) are easily compromised through social engineering and public records. 6. Allow paste in password fields — Support paste functionality in password fields so users can use password managers. Never disable paste. These guidelines are now adopted by Microsoft, Google, the FTC, and most cyber insurance carriers. If your organization still forces 90-day password rotation, you are using an outdated policy that actively weakens your security posture.

Password managers: the essential tool

The average employee manages 80-100 passwords. Without a password manager, they will reuse passwords across accounts — which means a single breach compromises multiple systems. Password managers solve this problem: - Generate unique, random passwords for every account (20+ characters, maximum entropy). - Store passwords in an encrypted vault protected by a single master password and MFA. - Auto-fill credentials, eliminating the need to remember or type passwords. - Flag reused, weak, or compromised passwords across all stored credentials. - Share credentials securely within teams without revealing the actual password. Recommended password managers for business: 1. 1Password Business — Industry leader for business password management. $7.99/user/month. Excellent team sharing, admin controls, and reporting. Integrates with SSO providers. 2. Bitwarden Business — Open-source, audited, and cost-effective. $4/user/month. Self-hosting option available. Strong security posture with regular third-party audits. 3. Dashlane Business — $8/user/month. Includes built-in VPN and dark web monitoring. Good admin dashboard and reporting. 4. Keeper Business — $3.75/user/month. Strong compliance reporting. Good for regulated industries needing detailed audit trails. Implementation approach: 1. Select a business-grade password manager (not consumer-grade). 2. Deploy to all employees and provide training on usage. 3. Enforce minimum password length policies in your IdP (15+ characters recommended). 4. Enable the breach monitoring feature to flag compromised credentials. 5. Require the password manager for all work-related accounts. 6. Pair with MFA enforcement — a password manager plus MFA is significantly stronger than either alone.

Implementing a modern password policy

Here is a practical password policy template aligned with NIST 800-63B: Password requirements: - Minimum length: 12 characters (15+ recommended). No maximum length below 64 characters. - No complexity requirements (no mandatory uppercase, number, or symbol rules). - Encourage passphrases: natural language phrases that are long and memorable. - Screen all new passwords against the Have I Been Pwned breached password database. - Block common passwords (password, 123456, company name, etc.). Password rotation: - No forced periodic rotation. - Require password change only when: credential compromise is suspected, the password appears in a breach database, or the employee reports a potential compromise. Password storage and management: - All employees must use the company-provided password manager for work accounts. - Unique passwords required for every account (enforced by the password manager). - Master password for the password manager must be a strong passphrase of 20+ characters. - MFA required on the password manager vault. Privileged accounts: - Administrative accounts require passwords of 20+ characters minimum. - Admin passwords must be stored in the password manager with restricted sharing. - Pair admin accounts with just-in-time access (PIM/PAM) where available. System-level enforcement: - Configure Microsoft Entra ID or Google Workspace to enforce minimum password length. - Enable Azure AD Password Protection or equivalent to block common and banned passwords. - Disable legacy authentication protocols that do not support MFA. - Enable self-service password reset with MFA verification. Training and communication: - Communicate the policy change clearly: explain why forced rotation is being removed. - Train employees on using the password manager. - Run a company-wide password audit using the password manager's health report. - Emphasize that MFA, not password complexity, is the primary defense against account compromise.

Key Takeaways

TL;DR

NIST 800-63B recommends no forced password rotation — only change passwords when compromise is suspected.

Prioritize password length (15+ characters) over complexity rules (uppercase, number, symbol).

Deploy a business password manager and require unique passwords for every account.

Screen all passwords against breached password databases like Have I Been Pwned.

Pair modern password policies with enforced MFA for the strongest account protection.

FAQ

Frequently asked questions

Why does NIST say not to force password rotation?

Research shows that forced periodic password changes lead to weaker passwords. Users develop predictable patterns (adding a number, changing a single character) and choose simpler base passwords because they know they will need to change them again. NIST 800-63B recommends changing passwords only when there is evidence of compromise — this results in stronger passwords that users actually remember.

Are complexity requirements still necessary?

No. NIST 800-63B explicitly recommends against arbitrary complexity requirements (must contain uppercase, number, symbol). These rules push users toward predictable patterns like "Password1!" instead of strong passphrases. A 20-character passphrase with no special characters is dramatically stronger than an 8-character password with all four character types.

Will my cyber insurance carrier accept a no-rotation policy?

Yes. Most carriers have updated their underwriting to align with NIST 800-63B. They focus on MFA enforcement, password manager deployment, and breach monitoring rather than rotation schedules. If a carrier questionnaire still asks about rotation, explain your NIST-aligned policy and emphasis on MFA. Carriers care about effective security, not checkbox compliance.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card. Real evidence.