<section title="16.1. Identification, Authentication and Authorisation"><subsection title="Objective"><paragraph
    title="16.1.1."


><![CDATA[<p>Access to information and systems is securely controlled and only provided to authorised entities, at all times.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.1.2."


><![CDATA[<p><!--[endif]-->Identification and authentication requirements are implemented in order to provide a secure means of access to information and systems.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="16.1.3."


><![CDATA[<p>The NZ Government Department of Internal Affairs (DIA) publishes a set of Identification Standards that work together to provide assurance that an organisation has the right information about the right entities and can use that to make access control decisions to ensure access is only provided to authorised entities.</p>]]></paragraph>
<paragraph
    title="16.1.4."


><![CDATA[<p>Controls in these Identification Standards related to identification and authentication are provided to facilitate credential provider’s ability to manage credentials to a level that will reduce the introduction of systemic risk across the NZ Government. The controls are also broadly acceptable to relying parties that are managing access to NZ Government information and information systems.</p>]]></paragraph>
<paragraph
    title="16.1.5."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]-->Access Controls can be defined as any mechanism by which an individual, system, or application grants or revokes the right to access a location, system, data, or perform an action.</p>]]></paragraph>
<paragraph
    title="16.1.6."


><![CDATA[<p>Although access controls remain fundamentally the same in any context, specific guidance and controls around virtualisation, cloud environments, microservices and containerisation are documented in Chapter 22 – Enterprise Systems Security and Chapter 23 – Public Cloud Security.</p>]]></paragraph>
</block>
<block title="New Zealand Government Identification Standards"><paragraph
    title="16.1.7."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;">The New Zealand Government publishes four Identification Standards:</p>
<ul>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/information-assurance-standard/" target="_blank">Information Assurance</a></li>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/binding-assurance-standard/" target="_blank">Binding Assurance</a></li>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/authentication-assurance-standard/" target="_blank">Authentication Assurance</a></li>
<li><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/identification-management-standards/federation-assurance-standard/" target="_blank">Federation Assurance</a></li>
</ul>]]></paragraph>
<paragraph
    title="16.1.8."


><![CDATA[<p>The first three standards are relevant to Relying Parties; all standards are relevant to Credential Providers.</p>]]></paragraph>
</block>
<block title="Methods for user identification and authentication"><paragraph
    title="16.1.9."


><![CDATA[<p>Authentication is detailed in the Authentication Assurance Standard and is the process by which an entity is verified before access permissions are confirmed, and access is granted to the entity requesting authentication.</p>]]></paragraph>
<paragraph
    title="16.1.10."


><![CDATA[<p>Authentication can be achieved by various means, including biometrics, cryptographic tokens, software tokens, passkeys, passphrases, passwords and smartcards.</p>
<p>NB: Where the NZISM refers to passwords it equally applies to passphrases.</p>]]></paragraph>
<paragraph
    title="16.1.11."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;">Authentication mechanisms are invariably described in terms of factors of authentication as follows:</p>
<ul>
<li>Something the entity has – the possession factor.</li>
<li>Something the entity knows – the knowledge factor.</li>
<li>Something the entity is or does – the biometric factor.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.12."


><![CDATA[<p>These authentication mechanisms may not provide sufficient protection when used in isolation. Using two or more authentication mechanisms provides additional security and is strongly advised.</p>]]></paragraph>
</block>
<block title="Methods for identification and authentication management"><paragraph
    title="16.1.13."


><![CDATA[<p>There are two distinct roles performed for identification management – a credential provider, and a relying party.</p>
<ul>
<li><strong><span style="text-decoration: underline;">Credential providers</span></strong> establish credentials that are used by relying parties to identify and authenticate users and systems. Entities expect these credentials to enable provision of service to the right systems.</li>
<li><strong><span style="text-decoration: underline;">Relying parties</span></strong> provide the services that are being accessed by the authorised users (entities) and systems. Relying parties use an entities’ credentials to ensure the right authorisations are in place prior to access of data or systems.</li>
</ul>
<p>NB: <strong>Entities</strong> (eg, a person or system) use credentials from the credential provider to gain a service from a relying party. The entity can either present their credentials to a service provider or use the credential provider to directly present the credentials to the relying party.</p>]]></paragraph>
</block>
<block title="Authenticating across multiple sign-ons"><paragraph
    title="16.1.14."


><![CDATA[<p>Federation allows credential service providers to provide authentication and subscriber attributes to a number of separately administered relying parties. These relying parties may use more than one credential service provider.</p>]]></paragraph>
<paragraph
    title="16.1.15."


><![CDATA[<p>Definitions relating to Federation include:</p>
<ul>
<li>Federated Identification Management (FIM) - Where a credential from a single credential provider may be used by a number of relying parties through an agreement that signifies trust between parties. This trust agreement is usually implemented through a process of federation between the parties.</li>
<li>Single Sign On (SSO) - Where credentials, specifically authenticators, are used within the context of a single organisation/domain, system owners can exercise more discretion regarding the acceptance of risk associated with the selection of identification, authentication, and authorisation controls.</li>
</ul>]]></paragraph>
</block>
<block title="Identification and authentication controls with Zero Trust "><paragraph
    title="16.1.16."


><![CDATA[<p>Zero Trust (ZT) is a security concept based around a central principle of ‘never trust, always verify’, being maintained through enforcing accurate, least privilege per-request access decisions on systems, services and networks.</p>]]></paragraph>
<paragraph
    title="16.1.17."


><![CDATA[<p>ZT means continuous verification and enforcement of access controls, regardless of location. This includes continuous authentication of entities on internal network and zones.</p>]]></paragraph>
<paragraph
    title="16.1.18."


><![CDATA[<p class="NormS16C1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]-->Implementation of ZT principles requires policy and procedure changes within organisations. The principles also guide and control through Network Access (ZTNA). &nbsp;Zero Trust implemented at a micro level (eg, segmentation of networks, applications, environments, user and process-based) allows more granular control of access enforcement of least privilege access policies.</p>]]></paragraph>
<paragraph
    title="16.1.19."


><![CDATA[<p>SSO and FIM support ZT principles with a centralised model to approve and remove access to entities. The timely revocation of accesses when no longer required ensures strengthened security to services and data at a micro level.</p>]]></paragraph>
<paragraph
    title="16.1.20."


><![CDATA[<p>Cloud services have been using a Zero Trust approach to security where policy decisions and policy enforcement points are used to control access based on authentication and privilege assignments. More information can be found in Chapter 23 - Public Cloud Security (reference 23.3.12).</p>]]></paragraph>
<paragraph
    title="16.1.21."


><![CDATA[<p>Successful implementation of Access Controls for ZT at an organisation level can be supported by the following methods:</p>
<ul>
<li>Implementation of Multi-Factor Authentication (MFA).</li>
<li>Use of adaptive authentication based on contextual factors (e.g. location, device, behaviour).</li>
<li>Least Privilege Access – enforced at a micro level within systems and networks. This may also include just-in-time (JIT) delivery of privileges.</li>
<li>Centralisation of user accounts and accesses.</li>
<li>Passwordless authentication models adopted within organisations.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.1.22."


><![CDATA[<p>Additional information relating to Identification, Authentication and Authorisation can be found at:</p>
<table class="table-main" style="width: 100%; height: 493.4px;">
<tbody>
<tr style="height: 29.4px;">
<td style="width: 33.032%; height: 29.4px;"><strong>Title</strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 29.4px;"><strong>Publisher</strong></td>
<td style="width: 51.4604%; height: 29.4px;"><strong>Source</strong></td>
</tr>
<tr style="height: 68.8px;">
<td style="width: 33.032%; height: 68.8px;">
<p class="no-uppercase"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identification Standards</span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 68.8px;">
<p><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">DIA</span></p>
</td>
<td style="width: 51.4604%; height: 68.8px;">
<p><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identity/identification-management/identification-management-standards/" target="_blank">Identification Management Standards | NZ Digital government</a></span></p>
</td>
</tr>
<tr style="height: 68.8px;">
<td style="width: 33.032%; height: 68.8px;">
<p><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Authentication Assurance Standard</span></span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 68.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">DIA</span></span></td>
<td style="width: 51.4604%; height: 68.8px;"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a href="https://www.digital.govt.nz/standards-and-guidance/identity/identification-management/identification-management-standards/authentication-assurance-standard/">Authentication Assurance Standard | NZ Digital government</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Assurance Services Panel</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">GCDO</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: white; mso-themecolor: background1;"><a rel="noopener noreferrer" href="https://www.nist.gov/identity-access-management/nist-special-publication-800-63-digital-identity-guidelines" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">GCDO Assurance Services Panel | NZ Digital government</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Mitigating the use of stolen credentials</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">ASD</span></span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://oauth.net/2/" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">PROTECT - Mitigating the Use of Stolen Credentials (October 2021).pdf (cyber.gov.au)</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity &amp; Access Management</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NIST</span></span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles/principle-10-identity-and-authentication" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity &amp; Access Management | NIST</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Implementing a Zero Trust Architecture</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">NIST - NCCoE</span></span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://fidoalliance.org/specifications/" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Implementing a Zero Trust Architecture | NCCoE</span></a></span></td>
</tr>
<tr style="height: 55.2px;">
<td style="width: 33.032%; height: 55.2px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Passwordless Authentication</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 55.2px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">Microsoft Security</span></span></td>
<td style="width: 51.4604%; height: 55.2px;"><span><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-howitworks" target="_blank"></a><a href="https://www.microsoft.com/en-us/security/business/solutions/passwordless-authentication?msockid=29ee405a98e26a061932539299fc6ba4">Passwordless authentication | Microsoft Security</a></span></td>
</tr>
<tr style="height: 50.4px;">
<td style="width: 33.032%; height: 50.4px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">AWS Identity and Access Management</span></span></strong></td>
<td class="text-center" style="height: 50.4px;" width="142" valign="top">
<p><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">AWS</span></p>
</td>
<td style="width: 51.4604%; height: 50.4px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://cheatsheetseries.owasp.org/cheatsheets/Multifactor_Authentication_Cheat_Sheet.html" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Access Management- AWS Identity and Access Management (IAM) - AWS</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity and Network Access</span></span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4729%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Microsoft</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" target="_blank"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identity and Access Management System | Microsoft Security</span></a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.032%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Password Storage Cheat Sheet</span></span></strong></td>
<td class="text-center" style="height: 36.8px;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">OWASP</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a href="https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#:~:text=This%20cheat%20sheet%20advises%20you%20on%20the%20proper,even%20if%20the%20application%20or%20database%20is%20compromised.">Password Storage - OWASP Cheat Sheet Series</a></span></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="16.1.23."


><![CDATA[<p class="NormS10C7">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 136.806%; height: 262.903px;">
<tbody>
<tr style="height: 62.4306px;">
<td style="width: 13.9736%; height: 62.4306px;"><strong>Reference</strong></td>
<td style="width: 21.0874%; height: 62.4306px;"><strong>Title</strong></td>
<td style="width: 64.9136%; height: 62.4306px;"><strong>Source</strong></td>
</tr>
<tr style="height: 200.472px;">
<td style="width: 13.9736%; height: 200.472px;"><strong>PSR Mandatory Requirements</strong></td>
<td style="width: 21.0874%; height: 200.472px;">
<p>GOV5,&nbsp;GOV6, GOV7,&nbsp;</p>
<p>INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4,</p>
<p>PERSEC1, PERSEC2, PERSEC3, PERSEC4,</p>
<p>PHYSEC1, PHYSEC2</p>
</td>
<td style="width: 64.9136%; height: 200.472px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><a href="https://www.protectivesecurity.govt.nz/policy/security-governance"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Policies and procedures"><paragraph
    title="16.1.24.R.01."

    tags="Information Security Documentation,Access Control,Passwords,Authentication"


><![CDATA[<p>Developing policies and procedures will ensure consistency in managing identification, authentication and authorisation across agency systems. Refer also to&nbsp;<a title="Privileged Access Management" href="/ism-document">Section 16.4 – Privileged Access Management</a>.</p>]]></paragraph>
<paragraph
    title="16.1.24.C.01."

    tags="Information Security Documentation,Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1827"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>develop, implement and maintain a set of policies and procedures covering all system users’:
<ul>
<li>identification;</li>
<li>authentication;&nbsp;</li>
<li>authorisation;</li>
<li>privileged access identification and management; and</li>
</ul>
</li>
<li>make their system users aware of the agency’s policies and procedures.</li>
</ul>]]></paragraph>
</block>
<block title="Implement zero trust principles"><paragraph
    title="16.1.25.R.01."

    tags="Network Security,Access Control,Authentication"


><![CDATA[<p>Agencies can be especially vulnerable to threats when internal systems can be accessed externally from the organisation. Implementing access through Zero Trust principles and architecture provides organisations with an enhanced security posture to ensure potential access threats on systems are minimised.</p>]]></paragraph>
<paragraph
    title="16.1.25.C.01."

    tags="Network Security,Technical,Access Control,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7541"
><![CDATA[<p>Agencies SHOULD design and implement Zero Trust principles and architecture to strengthen identification management.</p>]]></paragraph>
</block>
<block title="Unique system user identification"><paragraph
    title="16.1.26.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Having uniquely identifiable system users ensures accountability.</p>]]></paragraph>
<paragraph
    title="16.1.26.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1829"
><![CDATA[<p>Agencies MUST ensure that all system users are:</p>
<ul>
<li>uniquely identifiable; and</li>
<li>authorised&nbsp;<span>and authenticated on each occasion that access is granted to a system.</span></li>
</ul>]]></paragraph>
</block>
<block title="Shared accounts"><paragraph
    title="16.1.27.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Sharing of credentials (eg, passwords and UserIDs) may be convenient but doing so is highly risky. Shared credentials can defeat accountability and the attribution and non-repudiation principles of access controls.&nbsp; The risk increases when shared credentials are used for administrative privileges or access to classified information.</p>]]></paragraph>
<paragraph
    title="16.1.27.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="1832"
><![CDATA[<p>Agencies MUST NOT use shared credentials to access accounts.</p>]]></paragraph>
<paragraph
    title="16.1.27.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="7542"
><![CDATA[<p>Agencies MUST NOT use shared credentials to access administrator or privileged access accounts.</p>
<p>NB: Break Glass accounts are exempt from this control. For further guidance on Break Glass accounts see Emergency accounts (Break Glass accounts section).</p>]]></paragraph>
<paragraph
    title="16.1.27.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should Not"
    cid="1833"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies SHOULD NOT use shared credentials to access accounts.</span></p>]]></paragraph>
</block>
<block title="System user identification for shared accounts"><paragraph
    title="16.1.28.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Agencies may have a compelling business reason for the use of shared accounts.&nbsp; These may include anonymous, guest and temporary employee credentials.</p>]]></paragraph>
<paragraph
    title="16.1.28.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>As shared accounts are non-entity specific, agencies will need to determine an appropriate method for attributing actions undertaken using such accounts to specific personnel, and these are recorded or documented.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.1.28.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1837"
><![CDATA[<p>If agencies choose to allow shared, non user-specific accounts they MUST ensure that an independent means of determining the identification of the system user is implemented and logged.</p>]]></paragraph>
</block>
<block title="Methods for system user identification and authentication"><paragraph
    title="16.1.29.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>A personal identification number (PIN) is typically short in length and employs a small character set, making it susceptible to brute force attacks.</p>]]></paragraph>
<paragraph
    title="16.1.29.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Combining multiple methods when authenticating users can help to create a layered defence, making it harder for successful brute force attacks. Eg, a PIN connected to a hardware backed security measure like a trusted platform module (TPM) means the PIN is bound to a specific device.</p>]]></paragraph>
<paragraph
    title="16.1.29.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="1840"
><![CDATA[<p>Agencies MUST NOT use a numerical password (or personal identification number) as the sole method of authenticating a system user to access a system.</p>]]></paragraph>
<paragraph
    title="16.1.29.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1841"
><![CDATA[<p>Agencies SHOULD use multi-factor authentication (MFA) when identifying and authenticating system users.</p>]]></paragraph>
</block>
<block title="Centralisation of Identification and Authentication Management"><paragraph
    title="16.1.30.R.01."


><![CDATA[<p>Centralising authentication and the reliance on single credentials to access multiple systems and wider organisations (eg, SSO, FIM) enhances an organisation’s security posture through:</p>
<ul>
<li>centralisation to control access (joiners, movers, leavers);</li>
<li>reducing risk of password fatigue;</li>
<li>enforcing strong access controls;</li>
<li>enforcing password policies; and</li>
<li>reducing the risk of misconfiguration.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.30.R.02."


><![CDATA[<p>Centralised access management systems are beneficial to agencies; however, they also have the potential to introduce additional system risk to organisations. FIM may introduce additional risk due to sharing of credentials across external organisations.</p>]]></paragraph>
<paragraph
    title="16.1.30.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7543"
><![CDATA[<p>Agencies SHOULD assess and determine the risk of centralised access management systems, including SSO, to safely manage integration into systems and when using FIM.</p>]]></paragraph>
</block>
<block title="Passwords and policies"><paragraph
    title="16.1.31.R.01."


><![CDATA[<p>Passwords have historically been the primary authentication mechanism for almost all information systems and are a fundamental part of access and authentication.&nbsp; While there are other forms of authentication mechanisms available that can provide more robust security to attack vectors and threats in the environment, passwords remain a cost-effective baseline for authentication systems.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.02."


><![CDATA[<p>Passwords have traditionally been the terminology used for the memorised secrets allowing access and authorisation onto systems. The term ‘passphrases’ is often referred to in place of ‘passwords’, as it denotes longer (more secure), easier to remember memorised secrets.</p>
<p>Where the NZISM references passwords, it equally applies to passphrases.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.03."


><![CDATA[<p>Passwords are subject to three primary groups of risks:</p>
<p><!-- [if !supportLists]-->1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Intentional sharing.</p>
<p><!-- [if !supportLists]-->2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Theft, loss or compromise.</p>
<p><!-- [if !supportLists]-->3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Guessing and cracking.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.04."


><![CDATA[<p>Associated with these risk groups are four principal methods of attacking passwords:</p>
<ol>
<li>Interactive attempts including brute force attacks or some knowledge of the user or organisation.</li>
<li>Obtaining through social engineering or phishing.</li>
<li>Compromising through oversight, observation, use of keyloggers, cameras etc.</li>
<li>Decryption of network traffic interception, misconfiguration, data capture etc.</li>
</ol>]]></paragraph>
<paragraph
    title="16.1.31.R.05."


><![CDATA[<p>Password controls detailed in this section are designed to manage and mitigate these risk groups and attack methods. These controls will only be effective alongside organisation specific password policies and mandatory training for all system users.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.06."


><![CDATA[<p>Whilst passwords provide some security to systems, they still carry inherent risks. A layered approach to authentication is essential to ensuring systems and organisations are not made vulnerable from the authentication mechanisms used.<br><br>This includes establishing additional system controls alongside passwords. For example, ensuring MFA is mandatory in organisations, or mandating secure storage of passwords within organisations.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.07."


><![CDATA[<p>Mandatory training for all employees, including senior management, on these policies is essential to manage and mitigate risks associated with password attacks.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.08."


><![CDATA[<p>While implementing long and complex passwords is regarded as a fundamental security practice, it does not fully mitigate the risks associated with password-related attacks. A primary challenge can come from human behaviours. Unless password generators are employed, users often create non-unique passwords based on predictable patterns, even for lengthy credentials.</p>
<p>Multi-layered approaches such as MFA, passwordless authentication, and password expiries can help to mitigate these attacks.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.09."


><![CDATA[<p>Ensure a balance of security and usability considerations when deciding on implementing a password expiry policy for the organisation.</p>]]></paragraph>
<paragraph
    title="16.1.31.R.10."


><![CDATA[<p>It is vital that the security posture of a system is not weakened through authentication mechanisms. This relies on increasing the authentication and authorisation controls, including moving to appropriate multi-factor authentication, and stronger identify access management.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7544"
><![CDATA[<p>Agencies MUST ensure adequate password policies are implemented and enforced across all systems.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7545"
><![CDATA[<p>Agencies MUST implement a password policy enforcing <strong>at least annual</strong> password changes on systems that <strong>have not</strong> implemented MFA or passwordless authentication.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7546"
><![CDATA[<p>Agencies MUST implement a password policy enforcing:</p>
<ul>
<li>A minimum password length of 16 characters (e.g four words).</li>
<li>Passwords must be <strong>long, strong and unique</strong>. This means passwords must be a minimum character length, and are a combination of unique random words, characters or numbers.</li>
</ul>
<p>NB: no explicit complexity requirements are enforced (e.g. numbers or special characters), however passwords must be unique, or random and <strong>may</strong> include special characters and numbers to achieve this.</p>]]></paragraph>
<paragraph
    title="16.1.31.C.04."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7547"
><![CDATA[<p>To ensure security of systems are not weakened through authentication mechanisms, at a minimum, agencies MUST:</p>
<ul>
<li>apply MFA appropriately (refer to controls in Section 16.7);</li>
<li>ensure authentication secrets (including passwords) are securely stored;</li>
<li>remove knowledge-based questions from authentication process (eg, dog’s name, first school etc.);</li>
<li>new passwords are screened to reduce the likelihood of previously compromised passwords;</li>
<li>remove hints from authentication process; and</li>
<li>change passwords when a suspected or known compromise of an account has occurred.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.31.C.05."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="1869"
><![CDATA[<p>Agencies MUST NOT:</p>
<ul>
<li>allow predictable reset passwords;</li>
<li>store passwords in the clear on the system; and</li>
<li>reuse passwords when resetting multiple accounts.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.31.C.06."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7548"
><![CDATA[<p>Agencies SHOULD consider the use of location-based factors in the authentication process, (e.g., Users must be at an expected location (city, country, IP address) and provide the correct credentials for the authentication to succeed).</p>]]></paragraph>
<paragraph
    title="16.1.31.C.07."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7549"
><![CDATA[<p>When creating password policies, agencies SHOULD consider implementing annual password changes.</p>]]></paragraph>
</block>
<block title="Protecting stored authentication information"><paragraph
    title="16.1.32.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>When moving to passwordless authentication, agencies SHOULD carry out a risk assessment and evaluate passwordless authentication models to choose authentication mechanisms and factors that best fit the organisation’s security and authentication requirements.</p>]]></paragraph>
<paragraph
    title="16.1.32.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must Not"
    cid="1844"
><![CDATA[<p>Agencies MUST NOT allow storage of unprotected authentication information that grants system access, or decrypts an encrypted device, to be located on, or with the system or device, to which the authentication information grants access.</p>]]></paragraph>
</block>
<block title="Protecting authentication data in transit"><paragraph
    title="16.1.33.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Secure transmission of authentication information will reduce the risk of interception and subsequent use of the authentication information by an attacker to access a system under the guise of a valid system user.</p>]]></paragraph>
<paragraph
    title="16.1.33.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1847"
><![CDATA[<p>Agencies MUST ensure that system authentication data is protected when in transit on organisation networks or All-of-Government systems.</p>]]></paragraph>
</block>
<block title="Hashing"><paragraph
    title="16.1.34.R.01."

    tags="Approved Cryptographic Algorithms,Access Control,Passwords,Authentication"


><![CDATA[<p>Hashing is a means of protecting stored passwords or other authentication secrets by cryptographically converting the password to fixed length ciphertext.&nbsp; This protects against incidents where an unsanctioned copy of the password or authentication database has been made, exported or the database otherwise compromised.&nbsp; Approved cryptographic protocols are discussed in <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>. See also section&nbsp;<a title="Approved Cryptographic Algorithms" href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 - Approved Cryptographic Algorithms</a>&nbsp;for discussion on the use of salts to strengthen the cryptographic resistance of a hash.</p>]]></paragraph>
<paragraph
    title="16.1.34.C.01."

    tags="Approved Cryptographic Algorithms,Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="6553"
><![CDATA[<p>Password and other authentication secrets MUST be hashed before storage using an approved cryptographic protocol and algorithm. <span>See Chapter 17 – Cryptography. </span></p>]]></paragraph>
<paragraph
    title="16.1.34.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7562"
><![CDATA[<p>Passwords and other authentication secrets MUST be stored securely including being:</p>
<ul>
<li>salted (32 bits or more),
<ul>
<li>salts should be unique to each password and should be randomly generated.</li>
</ul>
</li>
<li>hashed (HMAC using SHA-2/3), and</li>
<li>“stretched” (such as PBKDF2 with at least:
<ul>
<li>600k iterations with internal hash function of HMAC-SHA-256; or</li>
<li>210k iterations with internal hash function of HMAC-SHA-512).</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Identification of foreign nationals"><paragraph
    title="16.1.35.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Where systems contain NZEO or other nationalities releasability marked or protectively marked information, and foreign nationals have access to such systems, it is important that agencies implement appropriate security measures to assist in identifying users that are foreign nationals. &nbsp;Such measures will assist in preventing the release of sensitive information to those not authorised to access it.</p>]]></paragraph>
<paragraph
    title="16.1.35.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1850"
><![CDATA[<p>Where systems contain NZEO or other nationalities releasability marked or protectively marked information, agencies MUST provide a mechanism that allows system users and processes to identify users who are foreign nationals, including seconded foreign nationals.</p>]]></paragraph>
<paragraph
    title="16.1.35.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1851"
><![CDATA[<p>Agencies using NZEO systems SHOULD ensure that identification includes specific nationality for all foreign nationals, including seconded foreign nationals.</p>]]></paragraph>
</block>
<block title="Resetting passwords and authentication vectors"><paragraph
    title="16.1.36.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>To reduce the likelihood of social engineering attacks aimed at service desks, agencies will need to ensure that system users provide sufficient evidence to prove they are the owner of the system account when requesting a password reset for their system account.&nbsp;</p>
<p>This evidence could be in the form of:</p>
<ul>
<li class="MsoListParagraph" style="text-indent: -1cm;">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<!--[endif]-->the system user physically presenting themselves and their security pass to service desk personnel who then reset their password;</li>
<li>physically presenting themselves to a known authorised colleague who uses an approved online tool to reset their password; or</li>
<li>providing a MFA code.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.36.R.02."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Issuing complex reset passwords maintains the security of the user account during the reset process. &nbsp;This can also present an opportunity to demonstrate the selection of strong passwords.</p>]]></paragraph>
<paragraph
    title="16.1.36.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1875"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST ensure system users provide sufficient evidence to prove they are the owner of the account when requesting a password reset for their system account or making changes to their multi-factor authenticators.</p>]]></paragraph>
<paragraph
    title="16.1.36.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7551"
><![CDATA[<p>Where passwords are not set by the account holder, agencies MUST use temporary passwords when resetting system user accounts.</p>]]></paragraph>
<paragraph
    title="16.1.36.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should Not"
    cid="7552"
><![CDATA[<p>Agencies SHOULD NOT use single factor authentication when changing users’ Multi-Factor Authentication details.</p>]]></paragraph>
</block>
<block title="Securing Passwords"><paragraph
    title="16.1.37.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Security of passwords is fundamental to ensuring system security across organisations. Password policies need to include how passwords are kept secure while passwords are in transit, stored or being used.</p>]]></paragraph>
<paragraph
    title="16.1.37.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Use of password managers within agencies provide employees a system to generate, secure, store, and distribute passwords. The paradigm behind a password manager is for an individual to store passwords and memorised secrets securely in a vault behind a single strong password. This generally means authentication secrets are at less risk of attacks and help to support a strengthened organisation security posture.</p>]]></paragraph>
<paragraph
    title="16.1.37.R.03."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Password managers store highly sensitive data, therefore it is imperative that agencies have completed a risk analysis and due diligence to ensure that passwords are suitably protected with the password manager, and are not accessible to third parties.</p>]]></paragraph>
<paragraph
    title="16.1.37.R.04."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>When using password managers, passwords may be stored in an encrypted form rather than salted and hashed. This is required for a password manager to function, and the technical risks associated with this are considered acceptable when addressing the risks of password re-use due to users needing to remember many different passwords. To mitigate this additional technical risk we recommend using MFA on the password manager.</p>]]></paragraph>
<paragraph
    title="16.1.37.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7558"
><![CDATA[<p>Password managers provide no additional security to the sign-in password. Agencies using password managers MUST ensure sign-in passwords adhere to the password security policies used by the organisation.</p>]]></paragraph>
<paragraph
    title="16.1.37.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7559"
><![CDATA[<p>Agencies using password managers SHOULD consider the use of MFA to access the password manager.</p>]]></paragraph>
</block>
<block title="Passwordless Authentication"><paragraph
    title="16.1.38.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Use of passwords are a common method of authenticating entities. Due to high reliance (from organisations) on passwords to control accesses, threat actors commonly use passwords as an attack vector to gain access into networks.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Passwordless authentication provides additional security mechanisms by moving away from ‘something you know’ and placing emphasis on other verification factors such as ‘something you have’ or ‘something you are’. These alternative authentication models can rely on other factors such as something you are or something you have (eg, biometrics, tokens, and authentication applications).</p>]]></paragraph>
<paragraph
    title="16.1.38.R.03."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Implementation of these alternative authentication models can be accomplished based on systems requirements and the access controls needs of organisations and systems.&nbsp; These alternative authentication models provide a range of security levels. Security levels of these passwordless authentication models, and how these are implemented in agencies have a significant impact on the level of security provided.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.04."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Prior to moving to passwordless authentication, agencies will need to consider cost, risks, and benefits to identify which authentication models are best suited to their systems.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.05."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Passwordless authentication <span style="text-decoration: underline;"><strong>does not</strong></span> mean ‘no authentication’.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.06."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Passwordless authentication moves systems toward possession factors (something you have or something you are) and away from using memorised secrets (something you know) as the primary way to authenticate users. This can provide additional security measures to ensure adequate authentication, and when used in conjunction with adequate controls and security policies, passwordless authentication can minimise the success of a phishing attack.</p>]]></paragraph>
<paragraph
    title="16.1.38.R.07."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Security strength of passwordless authentication models rely on what and how organisations implement architecture to support this. Although implementation of passwordless authentication by itself can be more secure than passwords, MFA used in conjunction with this architecture will significantly minimise the risk of compromise within agencies by adding another layer of security.</p>]]></paragraph>
<paragraph
    title="16.1.38.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="7556"
><![CDATA[<p>When moving to passwordless authentication, agencies SHOULD carry out a risk assessment and evaluate passwordless authentication models to choose authentication mechanisms and factors that best fit the organisation’s security and authentication requirements.</p>]]></paragraph>
</block>
<block title="Disabling vulnerable authentication mechanisms"><paragraph
    title="16.1.39.R.01."

    tags="Technical,Access Control,Passwords,Authentication"


><![CDATA[<p>The use of adequate and secure authentication mechanisms is an essential part of ensuring and maintaining secure systems and user accounts. Replacing mechanisms with known vulnerabilities for products with stronger authentication protocols should be considered.</p>]]></paragraph>
<paragraph
    title="16.1.39.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7554"
><![CDATA[<p>Agencies MUST ensure authentication methods that are susceptible to replay attacks are disabled.</p>]]></paragraph>
<paragraph
    title="16.1.39.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1878"
><![CDATA[<p>Agencies MUST disable LAN Manager for password authentication on workstations and servers.</p>]]></paragraph>
</block>
<block title="Session termination"><paragraph
    title="16.1.40.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Developing a policy to automatically logout workstations after an appropriate time of inactivity will assist in preventing the compromise of unattended workstations.</p>]]></paragraph>
<paragraph
    title="16.1.40.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Restarting of workstations after automatically logging out ensures cached credentials, authentication tokens or session keys that may persist after logging out are removed. It can also ensure any services and drivers are securely reloaded on systems.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.1.40.R.03."


><![CDATA[<p>Session tokens are a vector for account compromise. &nbsp;The session length of a session token is the lifespan of the token; specifically, how long the user remains authenticated before reauthentication is required. The length of these session tokens should be considered to minimise risk of attacks through this mechanism. Length of session tokens will be different across organisations and systems, based on risk appetite and specific requirements.</p>]]></paragraph>
<paragraph
    title="16.1.40.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1881"
><![CDATA[<p>Agencies SHOULD develop and implement a policy to automatically logout and shutdown workstations after an appropriate time of inactivity. This includes invalidating any session tokens.</p>]]></paragraph>
</block>
<block title="Screen and session locking"><paragraph
    title="16.1.41.R.01."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Screen and session locking will prevent access to an unattended workstation.</p>]]></paragraph>
<paragraph
    title="16.1.41.R.02."

    tags="Technical,Access Control,Passwords"


><![CDATA[<p>Ensuring that the screen does not appear to be turned off before entering the locked state will prevent system users from forgetting they are still logged in and will prevent other system users from mistakenly thinking there is a problem with a workstation and resetting it.</p>]]></paragraph>
<paragraph
    title="16.1.41.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="1885"
><![CDATA[<p class="Normal-nonumbering" style="margin-bottom: 6.0pt;"><span>Agencies MUST:</span></p>
<ul>
<li class="Normal-nonumbering">configure systems with a screen and session lock;</li>
<li>configure the lock to activate:
<ul>
<li>after a maximum of 10 minutes of system user inactivity; or</li>
<li>if manually activated by the system user;</li>
</ul>
</li>
<li>configure the lock to completely conceal all information on the screen;</li>
<li>ensure that the screen is not turned off or enters a power saving state before the screen or session lock is activated;</li>
<li>have the user reauthenticate to unlock the system; and deny users the ability to disable the locking mechanism.</li>
</ul>]]></paragraph>
<paragraph
    title="16.1.41.C.02."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Should"
    cid="1886"
><![CDATA[<p>Agencies SHOULD:</p>
<ul>
<li>configure systems with a session or screen lock;</li>
<li>configure the lock to activate:
<ul>
<li>after a maximum of 10 minutes of system user inactivity; or</li>
<li>if manually activated by the system user;</li>
</ul>
</li>
<li>configure the lock to completely conceal all information on the screen;</li>
<li>ensure that the screen is not turned off or enters a power saving state before the screen or session lock is activated;</li>
<li>have the system user reauthenticate to unlock the system; and</li>
<li>deny system users the ability to disable the locking mechanism.</li>
</ul>]]></paragraph>
</block>
<block title="Suspension of access"><paragraph
    title="16.1.42.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Locking a user account after a specified number of failed logon attempts will reduce the success of brute force attacks.</p>]]></paragraph>
<paragraph
    title="16.1.42.R.02."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Removing a system user account when it is no longer required will prevent personnel from accessing their old account and reduce the number of accounts that an attacker can target.</p>]]></paragraph>
<paragraph
    title="16.1.42.R.03."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Suspending inactive accounts after a specified number of days will reduce the number of accounts that an attacker can target.</p>]]></paragraph>
<paragraph
    title="16.1.42.R.04."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Investigating repeated account lockouts will reduce the security risk of any ongoing brute force logon attempts or inappropriate use of user accounts for services and allow security management to act accordingly.</p>]]></paragraph>
<paragraph
    title="16.1.42.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="1892"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>Record all successful and failed logon attempts;</li>
<li>lock system user accounts after three failed logon attempts;</li>
<li>use a temporary lock out feature to unlock system (max [] times);</li>
<li>have a system administrator reset locked accounts if [] times is superseded;</li>
<li>remove or suspend system user accounts as soon as possible when personnel no longer need access due to changing roles or leaving the organisation; and</li>
<li>remove or suspend inactive accounts after a specified number of days.</li>
</ul>
<p>NB: Agencies can determine the risk of using a temporary lock out feature on their specific systems.</p>
<p>[] indicates the chosen 'value of times' an agency has decided to use for the temporary lock out feature.</p>]]></paragraph>
</block>
<block title="Investigating repeated account lockouts"><paragraph
    title="16.1.43.R.01."

    tags="Access Control,Passwords,Authentication"


><![CDATA[<p>Repeated account lockouts may be an indicator of attempted account compromise.</p>]]></paragraph>
<paragraph
    title="16.1.43.C.01."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="Confidential, Secret, Top Secret"
    compliance="Should"
    cid="1896"
><![CDATA[<p>Agencies SHOULD ensure that repeated account lockouts are investigated before reauthorising access.</p>]]></paragraph>
</block>
<block title="Logon banner"><paragraph
    title="16.1.44.R.01."

    tags="Access Control"


><![CDATA[<p>A logon banner for a system serves to remind system users of their responsibilities when using the system.&nbsp; It may also be described as a “Splash Screen”, “Acceptable Use Policy” or “User Consent Screen”.</p>]]></paragraph>
<paragraph
    title="16.1.44.C.01."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="1899"
><![CDATA[<p>Agencies SHOULD have a logon banner that requires a system user to acknowledge and accept their security responsibilities before access to the system is granted.</p>]]></paragraph>
<paragraph
    title="16.1.44.C.02."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="1900"
><![CDATA[<p>Agencies SHOULD seek legal advice on the exact wording of logon banners.</p>]]></paragraph>
<paragraph
    title="16.1.44.C.03."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Should"
    cid="1901"
><![CDATA[<p>Agency logon banners SHOULD cover issues such as:</p>
<ul>
<li>the system’s classification;</li>
<li>access only being permitted to authorised system users;</li>
<li>the system user’s agreement to abide by relevant security policies;</li>
<li>the system user’s awareness of the possibility that system usage is being monitored;</li>
<li>the definition of acceptable use for the system; and</li>
<li>legal ramifications of violating the relevant policies.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
