I did a bit of research and I couldn't find a company that really provided a tool that did site password strength testing. While network penetration tools will test if a website is vulnerable to known attacks, they don't check password strength. There are some free individual password strength testers on the Internet, but the infosec pro in me wonders if they are legitimate strength testers or malware sites waiting for unsuspecting users to enter their passwords. As in most cases concerning security, the best enforcement of strong password generation is policy. By requiring passwords to meet minimum requirements and socializing the policy's rules to the general user population, password strength compliance will rise.
I find the following requirements useful. Passwords should:
- not be based on an English word,
- contain at least 3 lower-case letters,
- contain at least 3 upper-case letters,
- contain at least 2 decimal digits,
- be at least 8 characters in length, and
- be sufficiently random, meaning they are not common knowledge, such as a birth date, and do not follow a sequence of characters..
Of course, there are people who say that no password is strong enough, and there is some truth to this. Password authentication services are a weak solution without good on-boarding/off-boarding procedures, password retry rules, password expiration, and an understanding of the risks around sensitive information. And no matter how complicated a password is, it will never measure up to the security of multifactor authentication, which typically supplements a password with a second form of authentication like a smart card (something you have) or a thumbprint reader (something you are).
For more information:
- Check out these password management strategies to prevent password cracking in this expert response.
- Is it illegal to ask a fellow employee for his or her password? Read more.
This was first published in October 2009