Skip to content

Commit

Permalink
Update 0x11-V2-Authentication.md
Browse files Browse the repository at this point in the history
Drafted this for the following changes on this control: 
	* removing breached password checking during login
	* changed minimum number of breached passwords to be checked against from old value of 1,000 - 10,000 to 50,000 - 100,000 as per recommended by Jim 
	* added the phrase for reacting to major third party breaches

This Pull Request relates to issue #841 as per discussed.
  • Loading branch information
csfreak92 authored Mar 15, 2021
1 parent 5b56b3f commit d1c9152
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion 4.0/en/0x11-V2-Authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ Credential Service Providers (CSPs) provide federated identity for users. Users
| **2.1.4** | Verify that any printable Unicode character, including language neutral characters such as spaces and Emojis are permitted in passwords. |||| 521 | 5.1.1.2 |
| **2.1.5** | Verify users can change their password. |||| 620 | 5.1.1.2 |
| **2.1.6** | Verify that password change functionality requires the user's current and new password. |||| 620 | 5.1.1.2 |
| **2.1.7** | Verify that passwords submitted during account registration, login, and password change are checked against a set of breached passwords either locally (such as the top 1,000 or 10,000 most common passwords which match the system's password policy) or using an external API. If using an API a zero knowledge proof or other mechanism should be used to ensure that the plain text password is not sent or used in verifying the breach status of the password. If the password is breached, the application must require the user to set a new non-breached password. ([C6](https://owasp.org/www-project-proactive-controls/#div-numbering)) |||| 521 | 5.1.1.2 |
| **2.1.7** | Verify that passwords submitted during account registration and password change are checked against a set of breached passwords either locally (such as the top 50,000 to 100,000 most common passwords which match the system's password policy) or using an external API. If using an API a zero knowledge proof or other mechanism should be used to ensure that the plain text password is not sent or used in verifying the breach status of the password. Whenever there is a major third party breach of passwords, lock affected users and force a password change for the user to set a new non-breached password. ([C6](https://owasp.org/www-project-proactive-controls/#div-numbering)) |||| 521 | 5.1.1.2 |
| **2.1.8** | Verify that a password strength meter is provided to help users set a stronger password. |||| 521 | 5.1.1.2 |
| **2.1.9** | Verify that there are no password composition rules limiting the type of characters permitted. There should be no requirement for upper or lower case or numbers or special characters. ([C6](https://owasp.org/www-project-proactive-controls/#div-numbering)) |||| 521 | 5.1.1.2 |
| **2.1.10** | Verify that there are no periodic credential rotation or password history requirements. |||| 263 | 5.1.1.2 |
Expand Down

0 comments on commit d1c9152

Please sign in to comment.