{"id":6511,"date":"2019-11-18T00:33:34","date_gmt":"2019-11-18T00:33:34","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6511"},"modified":"2025-05-23T14:06:31","modified_gmt":"2025-05-23T13:06:31","slug":"nist-password-standards","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards","title":{"rendered":"NIST Password Guidelines"},"content":{"rendered":"<p>Security is a top priority for any managed services provider (MSP), but managing hundreds of passwords across an array of customers is no easy task. To protect their customers\u2019 data, MSPs work hard to roll out security strategies\u2014but are they effective?<\/p>\n<p>Piecemeal security strategies are not only ineffective\u2014they\u2019re also risky. Ad hoc strategies leave room for errors that could put customers\u2019 data in jeopardy. This is where comprehensive\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/information-security-framework\" target=\"_blank\" rel=\"noopener\">information security frameworks<\/a>\u00a0and guidelines from the National Institute of Standards and Technology (NIST) come into play.<\/p>\n<h2><b>What are NIST guidelines?<\/b><\/h2>\n<p>NIST guidelines are designed to help federal agencies meet regulatory compliance requirements like\u00a0<a class=\"ext\" href=\"https:\/\/www.dhs.gov\/cisa\/federal-information-security-modernization-act\" target=\"_blank\" rel=\"noopener noreferrer\">FISMA<\/a>,\u00a0<a class=\"ext\" href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA<\/a>, and\u00a0<a class=\"ext\" href=\"https:\/\/www.congress.gov\/bill\/107th-congress\/house-bill\/3763\" target=\"_blank\" rel=\"noopener noreferrer\">SOX<\/a>. But before we dig into NIST password standards, here\u2019s a brief overview of NIST and why its standards and guidelines are so highly regarded.<\/p>\n<p>Founded in 1901 as the Bureau of Standards, NIST is a non-regulatory federal agency within the U.S. Department of Commerce. While the organization develops guidelines and measures for a host of industries, it has a long-standing history of publishing best practices for information security.\u00a0<a class=\"ext\" href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener noreferrer\">The NIST Cybersecurity Framework<\/a>\u00a0(CSF) comprises guidelines based on research NIST gathers from a diverse array of security organizations and publications.<\/p>\n<p>NIST guidelines have become so well-respected, federal agencies are no longer the only ones turning to them for support. Many private sector organizations have also adopted these comprehensive, customizable, and credible guidelines to remain compliant and keep their entire infrastructure secure. Two of the most popular NIST guidelines for IT professionals are the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/nist-framework-cybersecurity\" target=\"_blank\" rel=\"noopener\">NIST Cybersecurity Framework<\/a>\u00a0and the NIST SP 800-63, which is part of the Special Publication 800-series.<\/p>\n<h2 class=\"h3\"><b>What is the NIST cybersecurity framework?<\/b><\/h2>\n<p>The NIST Cybersecurity Framework, also known as the Framework for Improving Critical Infrastructure Cybersecurity, serves as an extensive set of guidelines detailing how organizations can keep cybercriminals at bay. The CSF is a 55-page document divided into five distinct categories: identify, protect, detect, respond, and recover. While it\u2019s not a complete framework, many MSPs turn to it when developing their customers\u2019 internal information security frameworks\u2014or their own.<\/p>\n<h2 class=\"h3\"><b>What are the NIST Password Standards?<\/b><\/h2>\n<p>The best practices outlined in the NIST SP 800-63 are the latest NIST password guidelines to enter the industry. Previously modified in 2017, today\u2019s NIST password standards flip the script on many of the organization\u2019s historic password recommendations\u2014earning applause from IT professionals across the country. Here are some of the most important changes for MSPs:<\/p>\n<ul>\n<li><b>The more the merrier:\u00a0<\/b>The new NIST password guidelines suggest an eight-character minimum when the password is set by a human, and a six-character minimum when it\u2019s set by an automated system or service. They also recommend encouraging users to create lengthy passwords with a maximum length of 64 characters or higher. All applications must permit any printable characters listed within the American Standard Code for Information Interchange, including spaces, and should even accept UNICODE characters (like emojis).<\/li>\n<li><b>Remove the reset:\u00a0<\/b>For years, most MSPs have encouraged their customers to put password reset policies in place, requiring employees to change their passwords every few months or so. According to NIST, this should no longer be the case. The organization explains the reset periods have proven more detrimental than constructive. As users struggle to drum up countless creative, strong new passwords each month, they end up creating weaker passwords. Password strength should be about quality, not quantity\u2014one excellent password is better than 10 new, mediocre ones.<\/li>\n<li><b>Complexity isn\u2019t king:\u00a0<\/b>How often have you created a new account, for a new application, online store, or digital news outlet, and encountered the prompt, \u201cyour password must contain one lowercase letter, one uppercase letter, one number, and one symbol\u201d? For years, this type of configuration was the norm. But NIST now explains\u2014much like the new reset recommendation\u2014overly complex passwords can lead to poor password behavior. Users who forget their complicated passwords tend to end up replacing them with new, weaker ones.<\/li>\n<li><b>Make it a user-friendly affair:<\/b>\u00a0The \u201cshow password while typing\u201d is a rare option on many login sites. NIST suggests changing this, allowing more users to view their passwords as they enter them. Without this option, users are more inclined to choose shorter passwords that are easier to enter correctly. Shorter passwords are less secure, so any benefits gained from these visibility blocks are counteracted by weaker passwords.<\/li>\n<\/ul>\n<p>In the same vein, NIST also suggests foregoing settings that block users from pasting passwords. Users who are allowed to copy and paste their passwords are more likely to create and store stronger, lengthier passwords within\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">password managers<\/a>\u00a0as compared to those who are forced to type out their password every single time.<\/p>\n<ul>\n<li><b>Lose the clues:\u00a0<\/b>Some accounts will allow users to access a personal hint or provide an answer to a pre-selected question, like \u201cwhat was the name of your first pet?\u201d when they forget their credentials. But while knowledge-based authentication clues can save users from the hassle of creating a new password, they are also risky. Personal data abounds in today\u2019s digital era, making it easier than ever for hackers to decode hint prompts and breach systems. So while these clues may save time, foregoing these options is in everyone\u2019s best interest.<\/li>\n<li><b>Limit the attempts:\u00a0<\/b>Enabling an unlimited number of password attempts may temporarily help users who have forgotten their passwords, but they end up doing more harm than good. The latest NIST password standards recommend providing users with a maximum of 10 login attempts before they are turned away\u2014enough to aid a forgetful user, but not enough to assist brute-force attackers.<\/li>\n<li><b>A hands-free approach:<\/b>\u00a0Driving laws aren\u2019t the only regulations cracking down on texting. The NIST two-factor authentication (2FA) policy states that, while 2FA is still important, SMS texting services should not be a part of the process. SMS delivery isn\u2019t entirely secure, providing advanced cybercriminals with an opportunity to insert malware into the system. This malware can redirect text messages and facilitate attacks against the mobile phone network\u2014which is why SMS texting should be avoided entirely.<\/li>\n<\/ul>\n<h2 class=\"h3\"><b>Why are NIST password standards important?<\/b><\/h2>\n<p>Organizations large and small turn to NIST password guidelines when developing their information security framework\u2014the robust plan outlining the security policies and procedures employees must adhere to. These frameworks play a pivotal role in protecting MSPs and their customers from the increasingly\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/cyber-security-issues\" target=\"_blank\" rel=\"noopener\">prevalent threat of cybercriminals<\/a>. The most common\u2014and the most destructive\u2014password-based attacks include:<\/p>\n<ul>\n<li><b>Phishing attacks:\u00a0<\/b>While phishing attacks can take many forms, they often consist of a cybercriminal simply asking for a user\u2019s login ID and password. This \u201cask\u201d is typically disguised as a legitimate email request from a well-known service provider or vendor. Users who open the email are directed to a landing page created by the attacker and prompted to enter their credentials. If they are unaware the email request originated from a bad actor, they may provide the attacker with the keys to their personal data. According to a new report from\u00a0<a class=\"ext\" href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/state-of-phish\" target=\"_blank\" rel=\"noopener noreferrer\">Proofpoint<\/a>, phishing attacks skyrocketed in 2018, up 70% from 2017. When successful, these attacks result in lost productivity, reputation damage, and financial repercussions. It\u2019s important for MSPs to provide their customers (and employees) with insight and security training on how best to avoid these attacks. As a further precaution, MSPs should also limit password access through role-based permissions and\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/blog\/12-days-of-passwords-use-multi-factor-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">multifactor authentication (MFA)<\/a>.<\/li>\n<li><b>Brute force attacks:<\/b>\u00a0Brute force attacks take little skill to perform, making them a favorite among inexperienced hackers. During a brute force attack, hackers rely on computer programs that assault a user\u2019s login portal with tens, hundreds, and even thousands of requests per minute. These computer-driven programs start by guessing passwords with simple constructions, then escalate to more complex password attempts. This surprisingly effective attack is made even more effective when users implement a weak password or (worse) rely on default usernames and passwords. NIST password guidelines help MSPs keep these attacks at bay by requiring employees to develop one strong password\u2014preferably a passphrase\u2014that thwart attackers attempts.<\/li>\n<li><b>Credential stuffing:<\/b>\u00a0A credential stuffing attack is deployed by hackers who have gained access to at least one of the users&rsquo; current login credentials, often via a list of stolen usernames and passwords shared on the <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-the-dark-web\"  data-wpil-monitor-id=\"33\">dark web<\/a>. This attack is like a brute force attack, but current login credentials often prove to be a much more relevant starting point. Attackers use this list to construct various credential combinations to gain access to various accounts. This method proves highly effective because far too many users fail to develop strong, distinct password variations\u2014for example, relying on PumpkinPie!2 for one account and PumpkinPie!3 for another. MSPs who implement NIST password standards help prevent their customers and employees from succumbing to these all-too common pitfalls.<\/li>\n<li><b>Dictionary attack:\u00a0<\/b>This attack method relies on users who create short passwords containing popular words, thus earning the name \u201cDictionary Attack.\u201d This method is straightforward yet highly effective, and falls within the brute force family. According to a\u00a0<a class=\"ext\" href=\"https:\/\/www.scmagazineuk.com\/brute-force-dictionary-attacks-400-percent-2017\/article\/1473168\" target=\"_blank\" rel=\"noopener noreferrer\">report from eSentire<\/a>, brute force and dictionary attempts were up 400% in 2017. So while the word \u201csunshine\u201d might be easy for a user to remember, it\u2019s also easy for a hacker to guess. It\u2019s important for MSPs to advise their customers\u2019 and employees to stay away from simple word choices and opt for unique passphrases.<\/li>\n<\/ul>\n<h2 class=\"h3\"><b>Putting NIST password management into practice<\/b><\/h2>\n<p>Explaining the prevalence and potential damage of the attacks outlined above can provide your customers with the wakeup call they need to take password policies seriously. NIST standards were developed for a reason\u2014they work. Leaders who fail to remove default credential settings from their employees\u2019 accounts are missing an opportunity to educate them on the importance of unique passphrase construction\u2014and putting their businesses in jeopardy as a result. But if detailing the facts and figures doesn\u2019t work, this\u00a0<a class=\"ext\" href=\"https:\/\/www.teamsid.com\/splashdatas-top-100-worst-passwords-of-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">list of the most commonly used weak passwords in 2018<\/a>\u00a0should at least provide some guidelines as to what to avoid:<\/p>\n<ol>\n<li>123456<\/li>\n<li>password<\/li>\n<li>123456789<\/li>\n<li>12345678<\/li>\n<li>12345<\/li>\n<li>111111<\/li>\n<li>1234567<\/li>\n<li>sunshine<\/li>\n<li>qwerty<\/li>\n<li>iloveyou<\/li>\n<li>princess<\/li>\n<li>admin<\/li>\n<li>welcome<\/li>\n<li>666666<\/li>\n<li>abc123<\/li>\n<li>football<\/li>\n<li>123123<\/li>\n<li>monkey<\/li>\n<li>654321<\/li>\n<li>!@#$%^&amp;amp;*<\/li>\n<\/ol>\n<p>Customers and employees who see some variation of their own password on this list will hopefully be startled into action. But as an MSP, it\u2019s important you talk the talk and walk the walk by putting NIST standards into practice within your organization. Following these guidelines and leveraging\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/ocular\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based password management tools<\/a>\u00a0will help ensure your customers\u2019 data is safe and secure, forcing hackers to turn elsewhere.<\/p>\n<p>&nbsp;<\/p>\n<p><b>For more information on NIST guidelines and best practices read through our\u00a0<a href=\"https:\/\/www.n-able.com\/blog\" target=\"_blank\" rel=\"noopener\">related blog articles<\/a><\/b><b>.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is a top priority for any managed services provider (MSP), but managing hundreds of passwords across an array of customers is no easy task. To protect their customers\u2019 data,&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6511","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIST Password Guidelines and Requirements - N-able<\/title>\n<meta name=\"description\" content=\"Read about the most recent NIST password guidelines you need to know to ensure your IT infrastructure is secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Password Guidelines and Requirements - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the most recent NIST password guidelines you need to know to ensure your IT infrastructure is secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-18T00:33:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T13:06:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"NIST Password Guidelines\",\"datePublished\":\"2019-11-18T00:33:34+00:00\",\"dateModified\":\"2025-05-23T13:06:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\"},\"wordCount\":1758,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\",\"name\":\"NIST Password Guidelines and Requirements - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2019-11-18T00:33:34+00:00\",\"dateModified\":\"2025-05-23T13:06:31+00:00\",\"description\":\"Read about the most recent NIST password guidelines you need to know to ensure your IT infrastructure is secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST Password Guidelines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST Password Guidelines and Requirements - N-able","description":"Read about the most recent NIST password guidelines you need to know to ensure your IT infrastructure is secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards","og_locale":"fr_FR","og_type":"article","og_title":"NIST Password Guidelines and Requirements - N-able","og_description":"Read about the most recent NIST password guidelines you need to know to ensure your IT infrastructure is secure.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-11-18T00:33:34+00:00","article_modified_time":"2025-05-23T13:06:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"NIST Password Guidelines","datePublished":"2019-11-18T00:33:34+00:00","dateModified":"2025-05-23T13:06:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards"},"wordCount":1758,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards","url":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards","name":"NIST Password Guidelines and Requirements - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2019-11-18T00:33:34+00:00","dateModified":"2025-05-23T13:06:31+00:00","description":"Read about the most recent NIST password guidelines you need to know to ensure your IT infrastructure is secure.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/nist-password-standards#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"NIST Password Guidelines"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6511"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6511\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}