Findings Series: Weak Password Policy
Contents
* Description
* Classification
* Examples
* Remediation
* References
Description
Applications and environments are often only as secure as their weakest user account password. To prevent initial compromise from occurring through account takeover, it is common to enforce complexity, length, and renewal requirements for passwords across an application or network. When these requirements