Loading...
HomeMy WebLinkAbout _ 4.15(a)-- Approval of New Personnel Password Policy � � �' � � � � � � ' � �' � � ' � ` CITY OF REDDING REPORT TO THE CITY COUNCIL MEETING DATE: December 3, 2024 FROM: Kari Kibler, Personnel ITEIVI NO. 4.15(a) Director ***APPROVED BY*** � �, � � � ��� , i�]�r,Persr�nnel I�irectc�r ��f2f�12t?'�� rS' �P�ir�,C�i �� �, ��f��j,��� kkibler@cityofredding.org btippin@cityofredding.org SUBJECT: 4.15(a)--Approval of new Personnel Password Policy Recommendation Adopt a City of Redding (City} Personnel Policy - Password Policy providing guidance for administering passwords for the City as part of its efforts to maintain the confidentiality, integrity, and availability of the City's information, systems, and networks. Fiscal Impact There is no fiscal impact associated with approving the proposed City of Redding (City) Personnel Policy-Password Policy. Alternative Action The City Council could decline to approve the proposed Password Policy or provide alternative direction to staff. Backg�ound/Analysis The City does not currently have a formal password policy and wishes to adopt a fortnal policy to improve the City's cybersecurity protections as well as establish a baseline for administering passwords across applications. Currently, our password procedure requires an 8-character password wi�h complexity requirements (e.g. special characters, numbers, capitalized and lower-case letters). The proposed policy would establish a 16-character password with no complexity requirements. Additionally, the current procedure requires passwords to expire every 90 days. With the change to a 16- character password,passwords would expire every 365 days. Report to Redding City Council November 25,2024 Re: 4.15(a)--Approval of New Personnel Password Policy Page 2 In addition, the policy would establish cybersecurity hygiene practices related to passwords, such as not sharing or writing down passwords. The proposed policy has been shared with each of the City's Bargaining TJnits and no concerns were identified. Environmental Review This is not a project defined under the California Environmental Quality Act, and no further action is required. Council P�^iority/City Mccnage� Goals • Government of the 215t Century — `Be relevant and proactive to the opportunities and challenges of today's residents and workforce. Anticipate the future to make better decisions today." Attachments ^Final Personnel Policy- Password Policy h��p� CITY OF REDDING, CALIFORNIA �{���°''F PERSONNEL POLICIES AND PROCEDURES SUBJECT EFFECTIVE PAGE DATE Password Policy 12/3/2024 1 Personnel Director City Manager Purpose The purpose of this policy is to establish a baseline for administering passwords for the City of Redding (City) as part of its effort to maintain the confidentiality, integrity, and availability of the City's information, systems, and networks. Scobe This policy applies to all City employees, contractors, and anyone who has a responsibility for an account or any form of access to the City's information systems. Individual departments or divisions may set their own password standards or procedures based on their requirements. However, standards or procedures must adhere at minimum to this policy and may not be less stringent. Res�onsibilitv The Cyber Security Officer(CSO)will be responsible for maintaining and updating this policy with the approval of the Chief Information Officer(CIO). The City's Network Operations Center(�NOC) Systems Administrators wi11 be responsible for administering technical controls in the City's A.c;t�i��I���-��1:�rr�domain and all supported City applications. The City's Integrated Fublic Safety(TPS) Systems Administrators will be responsible for administering technical controls in all supported Il'S applications. Redding Electric Utility(REU) Operation Technology Engineers (OTEs)will be responsible for administering technical controls in all supported REU domains and applications. Redding Municipal Utility(RMI�will be responsible for the technical controls in all supported RMU domains and applications. PolicX I) Individual Responsibilities a. Passwords must be changed immediately upon issuance for�he first-use. Initial passwords must be transmitted securely to individuals. b. An individual's passwords must never be shared for any reason. IT will never ask end-users for their password. c. Passwords must be secured—Do not write passwords down or save them in a file on your computer. Passwords may be stored in a secure manner utilizing IT approved password manager solutions. d. Users must log off or lock their workstations when not present. e. City passwords should not be the same as personal account passwords. f. Passwords must meet the re uirements outlined in this olic in Section IIi. h��p� CITY OF REDDING, CALIFORNIA �{���°''F PERSONNEL POLICIES AND PROCEDURES SUBJECT EFFECTIVE PAGE DATE Password Policy 12/3/2024 2 g. Compromised passwords shall be immediately changed and reported to the CSO or delegates. II) Responsibilities of�vste�ns l�r���s��n��'���s�c��ds a. Passwords must not be displayed while entering the password into the system. b. Passwords must be stored and transmitted in an encrypted format and not in clear-text. c. Passwords must not be stored in clear-text as part of a script or scheduled task. d. Systems available to the Internet that allow access to the inside network or confidential information must be protected using Multi-Factor Authentication (1VIFA). e. Systems must not store or allow `hints' for remembering a password. III) Password Requirements—Passwords must: a. Contain at least 16 characters. b. Not be the same as the User ID. c. N�ot be a single dictionary ward or proper name. d. Expire within 365 days. e. Not be the same as the previous 10 passwords. £ Not be transmitted or stored in clear-text. g. Systems or applications that cannot support the above requirements will be set to the highest level of password complexity supported by the system. IV) Advanced Authentication a. Advanced authentication (AA) can be used in place of passwords. b. AA includes the following methods: i. Biometric. ii. User-based digital certificates (Public Key Infrastructure (PKI)). iii. Smart-cards. iv. Hardware tokens. c. AA must: i. Be specific to an individual user. ii. Prohibit users from sharing a certificate. iii. Require the user to aetivate or provision a certificate with a passphrase or PIN. d. Identifier Management i. Each user must be uniquely identified and verified. ii. Identifier must be issued to the intended party. iii. User identifiers will be disabled after 90 days of inactivity. e. Authentication Management i. Authenticators will be distributed to end-users b IT. h��p� CITY OF REDDING, CALIFORNIA �{���°''F PERSONNEL POLICIES AND PROCEDURES SUBJECT EFFECTIVE PAGE DATE Password Policy 12/3/2024 3 ii. Lost/stolen/compromised authenticators wi11 be reported immediately and disabled by IT upon notice of compromise. iii. Authenticators will be refreshed on a 3-year cycle. iv. Authenticators shall not be loaned or shared with other users. V) Privileged Accounts a. Privileged accounts should be stored in a�r�vi�� es�Ac����� ������ �r����t(PAM) system and have their password rotated upon each use whenever possible. b. Privileged accounts that cannot be stored in a PAM system, or that cannot rotate passwords upon use, must change their password every 90 days. c. At least 4 characters must change with each password iteration. d. Passwords must meet the following complexity requirement: i. Minimum of 20 characters long. ii. Capital, lower-case, numbers, and special characters. VI) Service Accounts a. Service accounts should utilize a PAM or passward managed service accounts (i.e. Group Managed Service Accounts (gSMAs)) to rotate passwords once per year. b. Service account passwords should be generated from a PAM system and should utilize the following complexity requirements: i. Minimum of 20 characters long. ii. Capital, lower-case, numbers, and special characters. c. Service Account passwords must be changed when the Service Account administrator leaves the organization or changes roles within the organization. VII) Account Lockout a. Accounts will be locked out after 5 invalid attempts for 90 minutes. b. The account will remain locked for the lockout duration of 90 minutes or; until the end-user utilizes the AD Self Service tool or; the end-user contacts the Service Desk and verifies their identity to have the Service Desk unlock their account. i. Note: Thin client users must ca11 the Service Desk or use a PC to unlock accounts. AD Self-Service is not available on thin clients. Password Self Service for Active Directory • Passwords can be reset using the AD Self-Service tool at ��tt s�//�c�r�d�s .ci.r�c�dzr�bec�.��s:925�/ h��p� CITY OF REDDING, CALIFORNIA �{���°''F PERSONNEL POLICIES AND PROCEDURES SUBJECT EFFECTIVE PAGE DATE Password Policy 12/3/2024 4 • End-users can also access the AD Self-Service tool from their computer's logon screen using the"Reset Password/Unlock Account"button in the lower-left corner of the screen. Reporting a Suspected Compromised Password or Securitv Incident If you believe your password has been compromised or if you have been asked to provide your password to another individual including IT Support, a supervisor, or a coworker,promptly notify the CSO using one the following methods: • Phone: (530) 339-7209 • Email: :��c.���ri�c�,�c����t�f�°�dd�t��.� Reporting a cybersecurity incident can be done without fear or concern for retaliation. De�nitions Active Directory—Microsoft's proprietary directory service. A centralized database of user and computer accounts used for logging into computer systems. Systems Processing Passwords—The computers or applications that will be accepting passwords from end-users. This includes workstations, servers, and computer programs. Privileged Accounts—Accounts used for escalated rights on systems or applications. For example, administrator accounts or domain admin accounts. Privileged Access Management(PAM)—Software that manages privileged access in a centralized database and monitors, detects, and helps prevent unauthorized privileged access to critical resources. Service Accounts—Non-user accounts that are utilized to run a specific service, task, or function on a computer. Recommendations for Creatin�Compliant Passwords Use a passphrase rather than a password • Choose a sentence,phrase, or series of random and unrelated words. • Use a passphrase that is easy to remember and has meaning to you. Example Passphrases: • P�1T2S0: KOaTt�110C� W1t11�0y E' �v��a„1 , w;.4���i�,�,.,:_ ��w, ��;���s�� ��iH�,r1� t �,�s�s,���3,;w'� ,�� �l..s��:'� tsz,.7C�;, �,J:i�� �;� jt tw',;'$4 (r��.i, h��p� CITY OF REDDING, CALIFORNIA �{���°''F PERSONNEL POLICIES AND PROCEDURES SUBJECT EFFECTIVE PAGE DATE Password Policy 12/3/2024 5 • Series of random words: stack process overbid press � .���.,� ,� �������� � ,�,o�� � ,���,���r�;��zn�a�m� .'�te .{Y.}„o ��t �z�:�;'� 7�lM1@(,n,y 3.��.ist ��7 „4jLi(a.�4,.�M��� • Sentence: When I was 5, I learned to ride a bike. F"`�?��,n 3� �������f�i�:�� ,� �� �����4 t����u.���� ���C, ��[��, �3. ,�,:.. �.�f �"4.� ii.,�r�t �a'� „ s,4a,.��,!��.�. . �� it�. �[`.'r��,a���€, ��� ��,.s.��. �kt���S� �'S° ., =i�fo-� ti)r� r ���.��3<�� s,;�3,#I 'a�:� I?+ � ,.�t1,l ,,.� �3�.���� r�>�.#!ti �i�(., ,,, .s��ka;i��'�,. , .,, �,a��,