Password and MFA Review Checklist: What to Audit and How to Fix Common Gaps
Use this practical checklist to evaluate password controls and multi-factor authentication (MFA) across your environment. You’ll identify common gaps quickly, verify what’s actually enforced, and prioritize fixes that reduce account takeover risk fast.
The guidance below organizes your review from policy to user behavior, then closes with remediation steps and a cadence for ongoing audits. Related concepts such as Password Complexity Requirements, MFA Enforcement Protocols, Account Lockout Policies, and Least Privilege Access Controls are woven throughout.
Password Policy Review
What to audit
- Scope and ownership: confirm the policy applies to all identities (workforce, contractors, service accounts) and that a clear owner maintains it.
- Minimum length and structure: prioritize length-first guidance and support for passphrases over strict character-class rules.
- Banned password checks: verify screening against breached or common-password lists at creation and reset.
- Password history and reuse: ensure sensible reuse limits without forcing unnecessary rotations.
- Administrative and service accounts: require stronger baselines and dedicated secrets handling for non-human and privileged identities.
- Reset and recovery: confirm identity verification steps and secure issuance of temporary credentials.
Password Complexity Requirements
Set a minimum of 14+ characters or passphrases, allow all printable characters, and avoid composition rules that nudge users toward predictable patterns. Encourage unique, lengthy phrases complemented by a vetted password manager.
Account Lockout Policies
Configure a reasonable threshold (for example, 10 invalid attempts) with timed lockouts that deter brute force while minimizing helpdesk burden. Consider progressive delays and detection of distributed guessing rather than aggressive permanent locks.
Credential Storage Standards
Confirm one-way salted hashing using modern, memory-hard algorithms (e.g., Argon2, scrypt, or bcrypt/PBKDF2 with strong parameters). Keys and salts must be protected, with secrets in transit always encrypted.
Evidence to collect
- Published policy with last review date and exceptions register.
- Directory and app screenshots or exports showing enforced settings.
- Sample password creation logs and failed-attempt metrics.
How to fix common gaps
- Adopt length-first passphrases and enable breached-password blocking.
- Align all systems to consistent baselines; remove weaker app-level overrides.
- Upgrade storage to current Credential Storage Standards and rotate at-risk hashes.
- Tune Account Lockout Policies, monitor lockout spikes, and add anomaly detection.
Multi-Factor Authentication Verification
What to audit
- Coverage: verify MFA is required for all users, especially admins, remote access, and high-risk apps.
- MFA Enforcement Protocols: check conditional access, session lifetime, step-up rules, and enforcement on legacy protocols.
- Method strength: inventory factors (FIDO2/WebAuthn, security keys, authenticator apps, push, SMS/voice) and their default/fallback order.
- Resilience: evaluate protections against prompt bombing, number-matching or challenge confirmations, and phishing-resistant options.
- Recovery: review backup codes, device re-enrollment, and helpdesk verification flows.
Evidence to collect
- Authentication policy exports and exception lists.
- Recent sign-in risk logs, MFA challenge results, and blocked legacy-auth attempts.
- Change records for MFA configuration updates and break-glass account controls.
How to fix common gaps
- Make MFA mandatory org-wide; require stronger, phishing-resistant methods for privileged roles.
- Enable number-matching or equivalent challenge confirmations to defeat MFA fatigue attacks.
- Limit SMS/voice to emergency fallback; prefer app-based OTP or hardware-backed authenticators.
- Apply step-up MFA for sensitive actions, device changes, and anomalous sign-ins.
- Block legacy protocols that bypass MFA and continuously monitor enforcement drift.
Common Password Issues
- Short minimum length and rigid composition rules that reduce usability without improving entropy.
- No breached-password screening, leading to easy reuse of known-compromised credentials.
- Overly aggressive expirations that encourage predictable patterns or unsafe storage.
- Weak or missing Account Lockout Policies enabling online guessing.
- Plaintext or reversible storage; outdated hashing parameters violating Credential Storage Standards.
- Default credentials left enabled on appliances or SaaS integrations.
- Shared accounts and uncontrolled service-account sprawl with stale secrets.
- No enterprise password manager standard, causing ad hoc and risky storage.
Address these by enforcing length-first Password Complexity Requirements, instituting breach screening, modernizing hashing, standardizing password managers, and rotating or removing shared and default credentials.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk AssessmentUser Access Review
What to audit
- Inventory: complete list of users, service accounts, and third-party identities across directories and key apps.
- Role design: map entitlements to roles and business functions; eliminate direct, one-off grants.
- Least Privilege Access Controls: ensure users have only the permissions needed, with separation of duties for sensitive workflows.
- Lifecycle: joiner-mover-leaver automation, timely deprovisioning, and dormant/orphaned account cleanup.
- Privileged access: break-glass accounts, PAM controls, session logging, and just-in-time elevation.
Evidence to collect
- Access recertification results and exception approvals.
- Group/role membership exports, last-login timestamps, and privilege elevation logs.
- Termination reports matched to account disablement dates.
How to fix common gaps
- Run quarterly access reviews with business owners; remove direct grants and align to roles.
- Automate lifecycle events; disable or delete dormant accounts after defined periods.
- Introduce PAM with just-in-time access and strong MFA for admin operations.
Security Awareness
What to audit
- Program coverage and cadence, including onboarding and periodic refreshers.
- Phishing Threat Mitigation: simulations, reporting channels, and response SLAs.
- Password hygiene training, manager reinforcement, and just-in-time prompts during resets.
How to fix common gaps
- Deploy targeted microlearning focused on MFA fatigue, password reuse, and recognizing consent prompts.
- Measure and publish metrics: phishing failure rate, report rate, time-to-report, and password reset quality.
- Integrate security tips into daily tools (SSO portal, helpdesk workflows) to nudge better choices.
Remediation Strategies
Prioritized plan
Immediate (0–2 weeks)
- Enforce org-wide MFA; protect admin and remote access first.
- Set 14+ character minimums, enable breached-password blocking, and rationalize Account Lockout Policies.
- Disable default and legacy-auth pathways that bypass MFA.
Near term (30–90 days)
- Standardize an enterprise password manager and migrate users.
- Upgrade hashing to current Credential Storage Standards; rotate weak or shared credentials.
- Deploy PAM and role-based access; remove direct entitlements and stale service accounts.
- Introduce phishing-resistant MFA for high-value targets.
Longer term (90+ days)
- Expand phishing-resistant methods broadly; adopt risk-based, step-up policies.
- Consolidate identity stores, harmonize policies, and automate joiner-mover-leaver flows.
- Continuously measure outcomes and refine based on incident learnings and audit findings.
Success metrics
- Decline in credential-stuffing success and password reset volume.
- MFA coverage and strong-method adoption rates.
- Access review closure times and reduction in privilege creep.
Audit Frequency
Run Quarterly Security Audits covering policies, enforcement, and exceptions, with monthly spot checks on high-risk systems. Trigger out-of-cycle reviews after major changes, vendor breaches, or findings from incident response.
Rotate deep dives: one quarter emphasize Credential Storage Standards and password hygiene; the next, MFA Enforcement Protocols and privileged access. Keep clear owners, a risk-ranked backlog, and evidence packages ready for compliance.
Conclusion
By validating policy, verifying MFA end-to-end, fixing recurring password issues, and enforcing Least Privilege Access Controls, you reduce account takeover risk substantially. Pair targeted education with a steady audit cadence to maintain strong, durable defenses.
FAQs.
What should be included in a password policy review?
Confirm scope and ownership, minimum length and passphrase support, breached-password screening, reuse limits, reset and recovery steps, Account Lockout Policies, and Credential Storage Standards. Validate that administrative and service accounts meet stricter baselines.
How can MFA vulnerabilities be addressed?
Mandate MFA everywhere, prioritize phishing-resistant methods, enable number-matching or equivalent confirmations, block legacy protocols, enforce step-up MFA for risky actions, and harden recovery flows. Monitor sign-in risk and remediate exceptions quickly.
How often should password and MFA reviews be conducted?
Perform Quarterly Security Audits with monthly checks on sensitive systems and any time there’s a major change or incident. Privileged access and remote-entry points merit more frequent validation.
What are effective remediation strategies for weak passwords?
Adopt length-first Password Complexity Requirements, implement breached-password checks, standardize an enterprise password manager, modernize hashing, tune Account Lockout Policies, and remove shared/default credentials. Communicate changes clearly and measure outcomes to ensure lasting improvement.
Ready to assess your HIPAA security risks?
Join thousands of organizations that use Accountable to identify and fix their security gaps.
Take the Free Risk Assessment