03.05.07—Authenticator Management
>Control Description
Maintain a list of commonly-used, expected, or compromised passwords, and update the list ⚙organization-defined frequency and when organizational passwords are suspected to have been compromised. Verify that passwords are not found on the list of commonly used, expected, or compromised passwords when users create or update passwords. Transmit passwords only over cryptographically protected channels. Store passwords in a cryptographically protected form. Select a new password upon first use after account recovery.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What documented policies and procedures address 03.05.07?
- •Who is accountable for implementing and maintaining 03.05.07 controls?
- •How frequently are 03.05.07 requirements reviewed, and what triggers updates?
- •What process ensures changes to systems maintain compliance with 03.05.07 requirements?
- •How are exceptions to 03.05.07 requirements documented and approved?
Technical Implementation:
- •What technical controls enforce 03.05.07 in your environment?
- •How are 03.05.07 controls configured and maintained across all systems?
- •What automated mechanisms support 03.05.07 compliance?
- •How do you validate that 03.05.07 implementations achieve their intended security outcome?
- •What compensating controls exist if primary 03.05.07 controls cannot be fully implemented?
Evidence & Documentation:
- •What documentation proves 03.05.07 is implemented and operating effectively?
- •Can you provide configuration evidence showing how 03.05.07 is technically enforced?
- •What audit logs or monitoring data demonstrate ongoing 03.05.07 compliance?
- •Can you show evidence of a recent review or assessment of 03.05.07 controls?
- •What artifacts would you provide during an assessment to demonstrate 03.05.07 compliance?
Ask AI
Configure your API key to use AI features.