ISO 27001 Password Policy: How to Write One

Learn what an ISO 27001 password policy must contain, what auditors look for, and how to write one that works in practice — not just on paper.

The password policy is one of the most practically important documents in your ISMS — and one of the most commonly done poorly. Either it sets unrealistic requirements that no one follows, or it’s so vague it provides no real guidance.

This guide explains what ISO 27001 requires for password management, how to write a policy that works in practice, and what auditors actually look for.


Which ISO 27001 Control Covers Passwords?

Password management falls primarily under Control 5.17 (Authentication information) in ISO 27001:2022. This control covers the management of secret authentication information — including passwords, PINs, and cryptographic keys.

It’s also supported by:

  • Control 5.15 (Access control) — the broader policy for who can access what
  • Control 5.16 (Identity management) — how identities are created and managed
  • Control 8.5 (Secure authentication) — the technical controls for implementing authentication securely

Between these four controls, ISO 27001 gives you a comprehensive framework for securing access. The password policy is the key document that brings the people and process side together.


What Must a Password Policy Cover?

ISO 27001 doesn’t dictate specific password lengths or complexity rules — it takes a risk-based approach. But Control 5.17 makes clear that the organisation must have rules in place for the selection, use, and management of authentication information.

Password Policy: Old Thinking vs Modern Guidance

Password Policy: Old Thinking vs Modern Guidance

How NCSC and NIST guidance has changed — and what your ISO 27001 policy should reflect

✗ Old approach — now outdated
✓ Modern guidance (NCSC & NIST)
Complexity
Mandatory complexity rules
Uppercase, number, symbol required — even on short passwords. Encouraged predictable substitutions.
P@55w0rd!
Length over complexity
Length is the strongest defence
12+ characters minimum; 16+ for privileged accounts. Complexity requirements are dropped in favour of length and memorability.
correct-horse-battery
Password expiry
Mandatory regular changes
Passwords expired every 30, 60 or 90 days regardless of whether they had been compromised. Led to predictable patterns.
Password1! → Password2!
Change on compromise
Change when there’s a reason to
Change passwords when compromised or suspected compromised. Forced regular expiry is removed — it weakens security by encouraging predictable choices.
NCSC guidance NIST SP 800-63B
Storage
Remember it yourself
No formal guidance on storage. Users relied on memory, leading to password reuse across systems or writing passwords down.
sticky note on monitor
Password manager
Use a password manager
Organisations should provide or mandate a password manager. Eliminates reuse, enables unique credentials per system, removes the memorisation burden.
ISO 27001 Control 5.17
Authentication
Password alone
A single credential was considered sufficient for most systems. MFA was reserved for high-security or remote access only.
MFA as standard
Multi-factor across all key systems
MFA required for all remote access, all privileged accounts, and all sensitive systems. Auditors increasingly expect broad MFA adoption, not just edge cases.
ISO 27001 Control 8.5
Default passwords
Change it when you remember
Default credentials on new devices and systems were sometimes left unchanged for extended periods, especially on internal systems.
admin / admin
Change on first use
All defaults changed immediately
Default passwords on every system must be changed before use. Temporary and system-generated passwords must also be changed on first login — enforced technically where possible.
ISO 27001 Control 5.17
Your ISO 27001 password policy should reflect current NCSC and NIST guidance — not outdated practices that users will work around. Policies that reflect how people actually behave are more likely to be followed.

A complete password policy should address:

1. Password creation requirements

What makes an acceptable password? Modern guidance (NCSC, NIST, and most certification bodies) has moved away from complex-but-short passwords (e.g. “P@ssw0rd!”) towards long-but-memorable ones (e.g. three random words). Your policy should reflect current best practice:

  • Minimum length — the NCSC recommends a minimum of 12 characters; many policies now specify 16+ for privileged accounts
  • Avoid common passwords — your systems should check new passwords against a list of commonly used/compromised passwords where possible
  • No mandatory complexity requirements for length-based passwords — this was dropped from NIST guidance because it makes passwords less memorable and encourages poor choices

2. Multi-factor authentication (MFA)

Any modern password policy should address MFA requirements. As a minimum, specify:

  • MFA is required for all remote access
  • MFA is required for all privileged accounts (admin, system accounts)
  • MFA is required for access to sensitive systems (HR, finance, customer data)

Increasingly, auditors expect to see MFA applied broadly — not just to remote access. If your organisation uses M365 or Google Workspace, enabling MFA organisation-wide is typically straightforward and provides strong evidence.

3. Password change and expiry

Again, guidance has evolved. NIST and NCSC no longer recommend mandatory regular password changes — forcing frequent changes leads to predictable patterns (“Password1!” → “Password2!”) and often weakens security. Instead:

  • Passwords should be changed when there’s reason to believe they’ve been compromised
  • Passwords must be changed when an account is first set up or reset
  • Privileged account passwords may have shorter mandated review cycles (e.g. every 90 days) where MFA isn’t available

Your policy should reflect this nuance rather than blanket-mandating monthly changes that your team will work around.

4. Password storage and sharing

  • Passwords must never be written down in an unsecured location (sticky notes, unencrypted spreadsheets)
  • A password manager should be used — either an organisation-provided enterprise solution or a recommended personal tool
  • Passwords must never be shared between individuals — each user must have their own credentials
  • System and service account credentials must be stored in a secure vault, not in code or scripts

5. Default and temporary passwords

  • Default passwords on all systems must be changed on first use
  • Temporary passwords must be changed on first login
  • System-generated passwords must be unique per user

6. Responsibilities

Who is responsible for enforcing password policy? Typically:

  • IT/system administrators are responsible for enforcing technical controls (minimum length, lockout policies)
  • Individual users are responsible for choosing strong passwords and protecting them
  • Line managers are responsible for ensuring offboarding procedures revoke credentials promptly

What Do Auditors Look For?

Auditors approach the password policy in two ways: reviewing the document itself, and looking for evidence it’s being followed.

Document review: Is the policy present, current, and consistent with good practice? Does it cover the areas above? Is it signed off and accessible to staff?

Operational evidence: This is where many organisations fall short. Auditors may ask to see:

  • A system configuration showing the minimum password length enforced
  • MFA enabled in your M365, Google Workspace, or other platform admin console
  • The lockout policy configured on your systems (how many failed attempts before lockout?)
  • Evidence from your password manager that it’s in use
  • A record from your access review process showing that credentials are deactivated when staff leave

The most common finding is a policy that says one thing and practice that does another. If your policy says “minimum 12 characters” but your systems allow 6, the auditor will raise a nonconformity.

What ISO 27001 Auditors Look For: Password Policy

What ISO 27001 Auditors Look for on Password Policy

Auditors check two things: the document, and whether it’s actually being followed

📄
Document Review
Is the policy itself fit for purpose?
Policy exists and is current A dated, version-controlled document — not a draft or an outdated copy from a previous certification cycle Policy doc
Covers all required areas Password creation, MFA requirements, storage, sharing prohibition, defaults, expiry, and responsibilities all addressed Policy doc
Reflects current good practice Length over complexity, passphrase approach, change-on-compromise — not outdated blanket expiry rules Policy doc
Approved and accessible to staff Signed off by senior management; shared with all staff via intranet, onboarding pack, or equivalent Approval record
Links to related controls References to access control policy, identity management, and technical enforcement where appropriate Policy doc
🔍
Operational Evidence
Is the policy actually being followed?
Minimum password length enforced in systems A system configuration screenshot showing the minimum length setting matches what the policy says System config
MFA enabled in admin console M365, Google Workspace, or other platform showing MFA turned on organisation-wide or for required user groups Screenshot
Account lockout policy configured Settings showing how many failed login attempts trigger lockout — typically 5–10 attempts System config
Password manager in use Evidence the organisation-provided password manager is deployed — licence records, admin console, or usage logs Licence / admin log
Credentials revoked on offboarding Access review or leavers log showing accounts deactivated promptly when staff leave — ideally same-day Access review log
The most common finding: a policy that says one thing and practice that does another. If your policy specifies a minimum 12-character password but your systems allow 6, the auditor will raise a nonconformity. Technical controls must match what the document says.
Gather operational evidence before your audit — not on the day. Screenshots, config exports, and access logs should be collated as part of your Stage 2 preparation.

A Note on Passphrases

The industry shift towards passphrases (three or more random words) rather than complex short passwords is worth reflecting in your policy. The NCSC’s guidance at ncsc.gov.uk explicitly recommends this approach for most passwords.

A 16-character passphrase like “correct-horse-battery-staple” is far harder to crack than “P@55w0rd” and far easier to remember. If your policy mandates complexity that effectively forces the latter, you’re working against your users rather than with them.


Suggested Policy Structure

1. Purpose and scope — what this policy covers and who it applies to

2. Authentication standards — minimum password length and passphrase approach; prohibition on common/compromised passwords; multi-factor authentication requirements (where mandatory, where recommended)

3. Password management — rules on storage (password manager required), no sharing, no writing down, changing on compromise

4. System and privileged accounts — specific rules for admin accounts, service accounts, shared credentials

5. Default and temporary passwords — must be changed on first use

6. Technical enforcement — reference to system configurations (lockout policy, length minimums) that enforce the policy technically

7. Responsibilities — IT, individual users, line managers

8. Review — how often the policy is reviewed and by whom


Getting the Policy You Need

The ISO 27001 toolkit includes a ready-to-edit password policy template aligned to ISO 27001:2022 and current NCSC guidance. It’s one of a full suite of supporting policies in the toolkit.

You can also read the guide to Control 5.17 (Authentication Information) for a deeper look at what the standard specifically requires from this control.


Get Started

Free Templates

Free

The 14 mandatory documents. The starting point for any ISO 27001 project.

A great way to get started without the commitment.

Get the free toolkit →

Templates

Full Toolkit

£85

130+ documents; policies, risk register, audit pack, staff communications and everything else you need to build a working ISMS.

Buy now →

Do-It-Yourself

DIY Course

£285

The Do-It-Yourself course introduces the standard, its requirements, and then shows you how to implement it, stage by stage.

Includes the full toolkit & email consultancy.

View the course →

More support?

Coaching

~£3,500

I can guide you through the standard and help you tailor it to your business through a series of coaching workshops.

Includes the full toolkit, personal consultancy, and first-pass guarantee.

Explore coaching →
Photo of author

Written by

Alan Parker

Alan Parker is an ISO 27001 consultant who has helped dozens of UK small businesses achieve certification — often without a dedicated security team or a large budget. With over 30 years in IT governance and qualifications including ITIL v3 Expert, ITIL v4 Bridge, and PRINCE2 Practitioner, Alan writes in plain English for busy teams who need to get things done. Named IT Project Expert of the Year (2024, UK).