DEEDIX

AI Solutions

All SolutionsFull AI offerings overview
Custom AI AssistantTailored conversational AI
AI IntegrationSeamless AI deployment
AI ToolsExplore AI productivity tools

Built for

IndividualsAI tools for personal productivity
SMEsAI for small & medium businesses
EnterpriseEnterprise-grade AI solutions

Infrastructure

All ServicesBrowse all IT & tech services
Managed IT Support24/7 infrastructure management
Cloud SolutionsAWS, Azure & Google Cloud
CybersecurityEnterprise-grade protection

Build

AI IntegrationTailored AI strategies & solutions
Software DevelopmentWeb apps, SaaS & custom builds
IT ConsultingStrategy & transformation

Education

Technical Training60+ courses & certifications

Products

All ProductsBrowse all products
LogWatchReal-time log monitoring & analytics
EventsPivotEvent management & tracking platform
InventfulInventory & sales tracking platform

Developer Tools

All ToolsFree open-source dev tools
Secret SuiteCryptographic toolkit, local-first

Products

All Work
SaaS Products
Web Apps

IT Projects

Cloud
Security
Enterprise

Education

Technical Trainings

Browse

All Resources40 free professional IT resources
AI ResourcesGenerative AI tools & guides
SEO ChecklistStep-by-step SEO audit guide

Security & Cloud

Audits & Assessments6 IT audit checklists
Cloud & Migrations6 migration planners
IT Policies7 ready-to-use templates

Build & Dev

Web & Development6 dev & launch checklists
AI & Automation4 AI tools & workflow guides
Directories3 curated tool lists

Grow

Career & Learning4 roadmaps & study plans
Business & Strategy4 templates & planners

Work With Us

Our Services
Get a Quote

Resources

Free Downloads
Whitepapers
FAQ

Shop

Smartphones
Gaming Consoles
Laptops
Accessories

Account

Track My Order
My Account
Get Started
Get Started
HomeResourcesIT Templates & Policies
IT Templates & PoliciesTemplate
8 min read

Password & Access Control Policy Template

Define NIST 800-63B-aligned password standards, MFA requirements by role, privileged access management, and the joiners-movers-leavers process.

Weak or reused passwords and excessive access privileges remain among the leading causes of security breaches. This policy template aligns with NIST SP 800-63B (2024 revision), NCSC Password Guidance, and ISO 27001 access management controls - moving away from complex rules that harm usability in favour of evidence-based best practice.

On this page

  • Password Standards (NIST SP 800-63B Aligned)
  • MFA Requirements by System Type
  • Joiners-Movers-Leavers (JML) Process
  • Quarterly Access Review Template

Password Standards (NIST SP 800-63B Aligned)

NIST 800-63B overturns old password myths

The 2024 NIST guidance removes forced periodic rotation (unless breach suspected), removes mandatory complexity rules, and instead focuses on minimum length, checking against breach databases, and mandating MFA.

PASSWORD POLICY
Version: 1.0 | Aligned with: NIST SP 800-63B (2024), NCSC Password Guidance

1. MINIMUM REQUIREMENTS
  - Minimum length: 12 characters for standard accounts
  - Minimum length: 16 characters for privileged accounts (admin, root, service accounts)
  - Maximum length: At least 64 characters must be supported (allow passphrases)
  - No mandatory complexity rules (upper, special chars) but strongly encouraged

2. PASSWORD ROTATION
  - Routine periodic rotation is NOT required (NIST 800-63B recommendation)
  - Immediate rotation REQUIRED when: breach suspected, account shared, employee leaves, phishing clicked
  - Privileged accounts: rotate quarterly and on any team member change

3. PROHIBITED PASSWORDS
  - Passwords must not appear in known breached password databases (check via HaveIBeenPwned API)
  - Do not use: name + year (John2024), company name, keyboard walks (qwerty123)
  - Do not reuse the last 12 passwords

4. PASSWORD MANAGER
  - All staff must use an approved password manager (1Password / Bitwarden / Keeper)
  - Unique passwords required for every account (no reuse across services)
  - IT will provide licences; personal use permitted on company-approved tools

5. MULTI-FACTOR AUTHENTICATION (MFA)
  - MFA is MANDATORY for: all cloud console access, VPN, email, HR/payroll, financial systems
  - Preferred MFA: Authenticator app (TOTP) or hardware key (YubiKey)
  - Acceptable: Push notification (with number matching to prevent MFA fatigue)
  - NOT acceptable: SMS OTP for high-risk systems (SIM swap vulnerable)

MFA Requirements by System Type

System / Access TypeMFA Required?Acceptable MFA MethodsNote
Cloud Consoles (AWS, Azure, GCP)MandatoryTOTP / Hardware keyRoot/Global Admin: only hardware key (YubiKey)
VPN AccessMandatoryTOTP / Push with number matchingNo SMS OTP
Corporate Email (M365/Google)MandatoryTOTP / Authenticator pushEnforce via Conditional Access / Entra ID
Financial Systems (accounting, payroll)MandatoryTOTP / Hardware keyPCI-DSS also requires MFA
HR & People PlatformsMandatoryTOTP / PushContains sensitive PII
Internal Tools (Jira, Confluence)Strongly RecommendedAny TOTP or SSOEnforce via SSO where possible
Developer Access (GitHub, CI/CD)MandatoryTOTP / Hardware key / GitHub passkeyCode repositories are high-value targets
Customer-Facing Web ApplicationRecommended (offer to users)TOTP / Passkey / PushImplement per-user optional; mandatory for admins

Cloud Consoles (AWS, Azure, GCP)

MFA Required?
Mandatory
Acceptable MFA Methods
TOTP / Hardware key
Note
Root/Global Admin: only hardware key (YubiKey)

VPN Access

MFA Required?
Mandatory
Acceptable MFA Methods
TOTP / Push with number matching
Note
No SMS OTP

Corporate Email (M365/Google)

MFA Required?
Mandatory
Acceptable MFA Methods
TOTP / Authenticator push
Note
Enforce via Conditional Access / Entra ID

Financial Systems (accounting, payroll)

MFA Required?
Mandatory
Acceptable MFA Methods
TOTP / Hardware key
Note
PCI-DSS also requires MFA

HR & People Platforms

MFA Required?
Mandatory
Acceptable MFA Methods
TOTP / Push
Note
Contains sensitive PII

Internal Tools (Jira, Confluence)

MFA Required?
Strongly Recommended
Acceptable MFA Methods
Any TOTP or SSO
Note
Enforce via SSO where possible

Developer Access (GitHub, CI/CD)

MFA Required?
Mandatory
Acceptable MFA Methods
TOTP / Hardware key / GitHub passkey
Note
Code repositories are high-value targets

Customer-Facing Web Application

MFA Required?
Recommended (offer to users)
Acceptable MFA Methods
TOTP / Passkey / Push
Note
Implement per-user optional; mandatory for admins

Joiners-Movers-Leavers (JML) Process

  1. 1

    Joiners - New Starters

    HR notifies IT 5 business days before start date. IT provisions: email, AD account, required systems only (least privilege). Access tied to role profile - no individual exceptions without manager + security approval. On day 1: issue device, enable MFA, review AUP, complete security awareness training.

  2. 2

    Movers - Internal Role Changes

    HR notifies IT of role change on effective date. IT review: add access for new role, REVOKE access from previous role (do not accumulate permissions). Access accumulation is a common compliance failure - audit regularly.

  3. 3

    Leavers - Employees Departing

    HR notifies IT minimum 48 hours before last working day (immediate for misconduct/dismissal). On departure: disable AD account, revoke O365 licence, disable VPN, remove from all SaaS tools, retrieve company devices. Archive mailbox 30 days, then delete. Review: were they a privileged user? Change any shared passwords they knew. Revoke all API keys and tokens under their name.

Quarterly Access Review Template

QUARTERLY ACCESS REVIEW - Q[X] [YEAR]
Review Date: ____________ | Reviewed By: ____________ | Approved By: ____________

SYSTEM: _____________________ | Review Period: _____________

Username  | Full Name   | Department | Access Level | Last Login    | Action Required
----------|-------------|------------|--------------|---------------|------------------
jsmith    | Jane Smith  | DevOps     | Admin        | 2026-01-15    | ✅ Confirmed
mwatson   | Mike Watson | Sales      | Standard     | 2026-01-20    | ✅ Confirmed
(former)  | Alex Jones  | HR (left)  | Standard     | 2025-09-01    | ❌ REVOKE IMMEDIATELY
contractor| TechCo Ltd  | N/A        | Read-only    | 2025-10-01    | Review - contract may have ended

SIGN-OFF
System Owner: _________________ | Date: _________________
IT Manager:   _________________ | Date: _________________

What’s next?

More ResourcesBrowse IT Templates & PoliciesView category Implement ItIT ComplianceView services Build SkillsGovernance CoursesExplore courses
Back to all resources

On this page

  • Password Standards (NIST SP 800-63B Aligned)
  • MFA Requirements by System Type
  • Joiners-Movers-Leavers (JML) Process
  • Quarterly Access Review Template

Related Resources

  • IT Acceptable Use Policy Template
  • IT Onboarding Checklist for New Staff
  • Cybersecurity Risk Assessment Template

Explore Further

  • More in this category
  • IT Compliance
  • Governance Courses
  • Related blog posts

Need hands-on help?

Our team can implement, audit, or consult on any of these areas for your business.

Talk to an expert

Contact Us:

info@deedixtech.com
+234 807 438 7880 NG+1 365-655-0498 CA
DEEDIX

Delivering AI solutions, cloud expertise, cybersecurity protection, and digital branding support since 2022.
Infinite possibilities for your business.

info@deedixtech.com+234 807 438 7880 NG+1 365-655-0498 CA
  • For Individuals
  • For Enterprise
  • Global Infrastructure
  • AppStore
  • About Us
  • Our Team
  • Careers
  • Digital Agency
  • DeediX AI
  • Managed IT
  • Cloud Solutions
  • Cybersecurity
  • IT Consulting
  • IT Tips
  • Tools
  • Case Studies
  • Whitepapers
  • FAQ

Get Started

  • For Individuals
  • For Enterprise
  • Global Infrastructure
  • AppStore

Company

  • About Us
  • Our Team
  • Careers
  • Digital Agency

Services

  • DeediX AI
  • Managed IT
  • Cloud Solutions
  • Cybersecurity
  • IT Consulting

Resources

  • IT Tips
  • Tools
  • Case Studies
  • Whitepapers
  • FAQ

Stay Updated

Latest IT insights and company updates.

Product names, logos, and trademarks referenced on this site are the property of their respective owners.
© 2026 DeediX Technologies. RC:1976012
SitemapPrivacyTermsTrademarks

Protected by Google reCAPTCHA Privacy Policy and Terms of Service apply.