Cybersecurity

NIST Password Guidelines 2026: Why 90-Day Rotation is Dead

| | 10 min read | Updated March 1, 2026

Bottom Line Up Front

NIST SP 800-63B Revision 4 prohibits arbitrary password rotation and replaces complexity rules with entropy requirements. The four mandates: minimum 8-character passwords (15+ for admins), no forced complexity, no periodic rotation (expire only on compromise evidence), and screening against compromised credential databases. Passkeys are now the NIST-endorsed path to eliminating passwords entirely. Update your Information Security Policy to reference SP 800-63B Rev. 4 before your next SOC 2 or ISO 27001 audit.

Forced password rotation is a security vulnerability, not a security control. NIST SP 800-63B Revision 4 formally prohibits arbitrary rotation because the practice produces the opposite of its intended effect [NIST SP 800-63B Rev. 4]. Users subjected to 90-day rotation create predictable patterns: “Winter2025!” becomes “Spring2026!” becomes “Summer2026!” An attacker running a password spraying tool guesses the current season plus the year plus an exclamation mark. The pattern succeeds against 23% of accounts on the first attempt.

The same revision eliminates forced complexity rules (one uppercase, one symbol, one number). Entropy, not character variety, determines password strength. A 12-character password with forced complexity (“Tr0ub4dor&3”) falls to a modern GPU in approximately 3 days. A 28-character passphrase (“correct horse battery staple”) resists the same attack for an estimated 550 years. The math is settled. The policies have not caught up.

Four NIST password guidelines 2026 requirements replace legacy practices: minimum length over complexity, rotation only on evidence of compromise, screening against compromised credential databases, and passkeys as the preferred authentication method.

NIST password guidelines 2026 (SP 800-63B Rev. 4) mandate four changes: minimum password length of 8 characters (15+ for administrative accounts), removal of forced complexity rules (no required symbols or mixed case), termination of arbitrary rotation (passwords expire only on evidence of compromise), and screening against known compromised credential databases. Passkeys (syncable authenticators) are now the preferred authentication method over traditional passwords [NIST SP 800-63B Rev. 4].

The Four NIST Password Mandates

NIST SP 800-63B Revision 4 defines four requirements forming the baseline for “reasonable security” in password management. SOC 2 auditors and ISO 27001 assessors use these requirements as the benchmark for evaluating organizational password policies [NIST SP 800-63B Rev. 4]. Organizations conducting a formal NIST cybersecurity assessment can map these password controls directly to their broader security program evaluation.

1. Terminate Arbitrary Rotation

NIST explicitly prohibits requiring periodic password changes. Passwords expire only when evidence of compromise exists: a credential appearing in a breach database, suspicious login activity from the account, or confirmed phishing against the user. Forced rotation creates predictable patterns (season + year + symbol) attackers exploit through password spraying. The research is definitive: mandatory rotation degrades password quality across the user population [NIST SP 800-63B Rev. 4, Sec. 5.1.1.2].

2. Prioritize Length Over Complexity

Set minimum password length to 8 characters for standard users and 15 characters for administrative accounts. Remove requirements for uppercase letters, numbers, and symbols. Entropy (password length) determines brute-force resistance. A GPU-accelerated cracking rig processes 100 billion guesses per second against common hash algorithms. Every additional character multiplies the keyspace exponentially. Length is the only variable slowing the math.

3. Screen Against Compromised Credentials

Check every new password against databases of known compromised credentials (Have I Been Pwned, NIST bad password list). If a user attempts to set a password appearing in any breach database, the system blocks it regardless of length or complexity. Credential stuffing attacks succeed because users reuse passwords across services. Screening eliminates the most common attack vector: a password already in an attacker’s dictionary. Organizations pairing credential screening with broader vulnerability management practices close the gap between identity hygiene and infrastructure security.

4. Accept Passkeys as Primary Authentication

NIST SP 800-63B Rev. 4 formally accepts syncable authenticators (passkeys) as a valid authentication method [NIST SP 800-63B Rev. 4]. Passkeys use public-key cryptography: the authentication credential never leaves the device, eliminating phishing and credential stuffing entirely. Apple, Google, and Microsoft support passkeys natively. Organizations deploying passkeys for workforce authentication remove passwords from the attack surface.

Requirement Legacy Standard NIST 2026 Standard
Expiration Forced reset every 90 days No expiration unless compromised
Complexity 1 uppercase, 1 lowercase, 1 symbol Length only (15+ recommended)
History Block reuse of last 24 passwords Not required (rotation eliminated)
Screening None Block passwords found in breach databases
Preferred Method Password + SMS OTP Passkeys (phishing-resistant)

Update your Information Security Policy with three changes: (1) remove the password rotation requirement and replace it with “passwords expire only upon evidence of compromise or when detected in a compromised credential database,” (2) set minimum length to 8 characters for standard users and 15 characters for privileged accounts with no complexity requirements, and (3) implement compromised credential screening using Have I Been Pwned API integration or an identity provider with built-in breach detection (Azure AD, Okta). Document the policy change with a reference to NIST SP 800-63B Rev. 4 as the standard of care.

The Legacy System Trap

Your updated policy mandates 15-character passwords. Your AS/400 mainframe, JD Edwards ERP, or legacy healthcare application physically caps passwords at 8 characters. The policy does not match the practice. SOC 2 auditors flag this gap as a control deficiency: your written standard exceeds your technical capability, creating a documented inconsistency the auditor must report. Organizations implementing the NIST Cybersecurity Framework encounter this tension when mapping identity controls across environments with mixed technology generations.

The Compensating Control Strategy

Document a formal Risk Acceptance for each legacy system unable to meet the 15-character requirement. Place the legacy system behind a VPN or jump server enforcing modern authentication at the gateway level. Users authenticate with 15-character passwords and MFA to reach the VPN. The VPN session grants access to the legacy system with its 8-character limitation. The gateway compensating control satisfies the NIST standard at the access boundary while acknowledging the technical constraint of the downstream system.

Create a Legacy System Risk Acceptance document listing every system unable to meet the updated password policy. For each system, document: the system name, the technical password limitation, the compensating control (VPN/jump server with MFA), the risk owner approving the acceptance, and the review date (annually). Attach the document as an appendix to your Information Security Policy. Auditors reviewing CC6.1 (SOC 2) or A.8.5 (ISO 27001) accept documented compensating controls with formal risk acceptance. Undocumented exceptions create findings [AICPA TSC CC6.1].

How Do Passkeys Replace Passwords Under the NIST 2026 Standard?

Passkeys represent the NIST-endorsed path to eliminating passwords from your authentication architecture. A passkey uses public-key cryptography bound to the user’s device. The private key never transmits over the network. Phishing attacks fail because there is no password to intercept. Credential stuffing fails because there is no reusable credential to stuff. Organizations pursuing Zero Trust architecture treat passkey adoption as a foundational step: removing shared secrets from the authentication chain eliminates the largest category of credential-based attacks.

Implementation Phases

Phase 1 (0-6 months): Deploy passkeys for IT administrators and privileged accounts first. These accounts face the highest credential attack volume and benefit most from phishing-resistant authentication. Phase 2 (6-12 months): Extend passkeys to all workforce users accessing cloud applications through identity providers supporting FIDO2 (Azure AD, Okta, Google Workspace). Phase 3 (12-18 months): Evaluate passkey support for legacy applications and customer-facing authentication. Applications without FIDO2 support retain password authentication with the updated NIST requirements as the fallback standard.

Password Spraying: Why Rotation Creates the Vulnerability

Password spraying attacks exploit predictable rotation patterns. The attacker does not guess random strings. The attacker guesses “CompanyName2026!” across thousands of accounts simultaneously. The attack stays below lockout thresholds (one guess per account per rotation cycle). Forced 90-day rotation guarantees predictable patterns because users append the current quarter or season to a base word. Eliminating rotation eliminates the pattern. Passkeys eliminate the attack category entirely. Your incident response plan should include specific detection rules for password spraying attempts, triggering credential resets for targeted accounts rather than blanket rotation policies.

Add a “Passkey Adoption Roadmap” section to your Information Security Policy documenting the three-phase deployment timeline. For the interim period (before full passkey deployment), enforce three controls: (1) phishing-resistant MFA (FIDO2 security keys or platform authenticators) for all privileged accounts, (2) compromised credential screening for all password-based authentication, and (3) conditional access policies blocking legacy authentication protocols (IMAP, POP3, SMTP AUTH) allowing password-only access. These three controls address the highest-risk attack vectors while the organization transitions toward passwordless authentication.

Forced password rotation is security theater. The research is settled, and NIST codified it: rotation degrades password quality by creating predictable patterns attackers exploit through spraying. Update your policy to NIST SP 800-63B Rev. 4 requirements: length over complexity, no arbitrary rotation, compromised credential screening. Then start the passkey roadmap. Every account using passkeys removes one password from the attack surface. The goal is not better passwords. The goal is no passwords.

Frequently Asked Questions

What are the NIST password guidelines for 2026?

NIST password guidelines 2026 (SP 800-63B Rev. 4) mandate four changes: minimum 8-character passwords (15+ for admins), no forced complexity rules, no arbitrary password rotation (expire only on compromise evidence), and screening against compromised credential databases. Passkeys are now the preferred authentication method [NIST SP 800-63B Rev. 4].

Is NIST SP 800-63B mandatory for private companies?

NIST SP 800-63B is technically mandatory only for federal agencies, but SOC 2 auditors and ISO 27001 assessors use it as the benchmark for evaluating “reasonable security” in private sector password management. Private sector organizations adopt it voluntarily, but SOC 2 auditors and ISO 27001 assessors use it as the benchmark for “reasonable security” in password management. Organizations aligning password policies with the broader NIST Cybersecurity Framework achieve stronger audit outcomes by connecting identity controls to enterprise-wide risk management. Organizations maintaining legacy 90-day rotation policies face auditor scrutiny and must defend the practice against the current NIST standard [AICPA TSC CC6.1].

Does MFA eliminate the need for strong passwords?

Multi-factor authentication adds a critical second layer but does not replace password strength requirements because if MFA fails through SIM swap or push fatigue, the password becomes the sole defense. NIST recommends defense in depth: a 15-character minimum password length complementing phishing-resistant MFA (FIDO2 keys or platform authenticators). If MFA fails (SIM swap, push fatigue attack), the password becomes the sole defense. Both controls work together [NIST SP 800-63B Rev. 4].

How do I handle legacy systems unable to support long passwords?

Legacy systems with password length limitations (commonly capped at 8 characters) require a formal, documented Risk Acceptance paired with compensating controls like VPN or jump server authentication. Implement a compensating control: place the system behind a VPN or jump server enforcing modern authentication (15+ character password and MFA) at the gateway. The compensating control satisfies the NIST standard at the access boundary. Auditors accept documented compensating controls with formal risk acceptance and annual review dates.

What are passkeys and should I deploy them?

Passkeys use public-key cryptography bound to the user’s device. The private key never transmits over the network, eliminating phishing and credential stuffing. Apple, Google, and Microsoft support passkeys natively. Deploy passkeys for privileged accounts first, then extend to all workforce authentication. NIST SP 800-63B Rev. 4 formally endorses passkeys (syncable authenticators) as a valid authentication method [NIST SP 800-63B Rev. 4].

How do I implement compromised credential screening?

Integrate the Have I Been Pwned API into your identity provider or authentication service. The API checks new passwords against a database of billions of compromised credentials without transmitting the full password (k-anonymity model). Major identity providers (Azure AD, Okta, Google Workspace) include built-in breach detection. Block any password appearing in a breach database regardless of length or complexity.

Get The Authority Brief

Weekly compliance intelligence for security leaders and technology executives. Frameworks decoded. Audit strategies explained. Regulatory updates analyzed.

Discipline in preparation. Confidence in the room.

Josef Kamara, CPA, CISSP, CISA, Security+
Josef Kamara
Josef Kamara
CPA · CISSP · CISA · Security+

Former KPMG and BDO. Senior manager over third-party risk attestations and IT audits at a top-five global firm, and former technology risk leader directing the IT audit function at a Fortune 500 medical technology company. Advises growth-stage SaaS companies on SOC 2, HIPAA, and AI governance certifications.