Skip to main content
← All controls
IA-5(1) / A.9.4.3 / CIS-5.2 NIST SP 800-63B

Breached-password screening enabled

Demonstrate that the organization enforces automated screening of user passwords against known-breached password databases at account creation, password change, and optionally at authentication, preventing selection of compromised credentials.

Description

What this control does

Breached-password screening prevents users from selecting or retaining passwords that have been exposed in public data breaches by comparing credential hashes or values against known-compromised password databases (e.g., Have I Been Pwned, vendor threat intelligence feeds). This control is typically enforced at password creation, password reset, and optionally during periodic authentication flows. It significantly reduces credential-stuffing and brute-force attack success rates by eliminating passwords already in attacker toolkits.

Control objective

What auditing this proves

Demonstrate that the organization enforces automated screening of user passwords against known-breached password databases at account creation, password change, and optionally at authentication, preventing selection of compromised credentials.

Associated risks

Risks this control addresses

  • Credential-stuffing attacks succeed using passwords harvested from third-party breaches against organizational accounts
  • Brute-force attacks efficiently compromise accounts by prioritizing commonly-breached passwords
  • Users unknowingly reuse passwords previously exposed in unrelated data breaches
  • Attackers leverage publicly-available breach dumps to bypass password complexity requirements that do not account for real-world compromise
  • Privilege escalation occurs when administrative accounts use credentials already in attacker password lists
  • Regulatory non-compliance with authentication standards requiring breach-awareness (e.g., NIST 800-63B Authenticator Assurance Levels)

Testing procedure

How an auditor verifies this control

  1. Inventory all identity and access management platforms, authentication systems, and directory services (Active Directory, Azure AD, Okta, SSO providers) in scope.
  2. Review authentication policy configurations to confirm breached-password screening is enabled and identify the source database or service used (e.g., Azure AD Password Protection, Entra ID banned password lists, third-party API integrations).
  3. Examine configuration settings to determine enforcement scope, including whether screening applies to password creation, password reset, and/or periodic authentication events.
  4. Request and review documentation or configuration exports showing the frequency of breached-password database updates and the last successful synchronization timestamp.
  5. Perform a controlled test by attempting to create or reset a test account password using a known-breached password from public datasets (e.g., 'P@ssw0rd', 'Password123!') to verify rejection.
  6. Review audit logs or security event logs for a sample period (30-90 days) to identify instances where users were blocked from selecting breached passwords and confirm logging granularity.
  7. Validate that exceptions or bypass mechanisms are documented, justified, and restricted to specific administrative scenarios with compensating controls.
  8. Interview IT or identity management personnel to confirm procedures for responding to newly-disclosed breaches and updating banned password lists accordingly.
Evidence required Collect authentication policy configuration exports or screenshots showing breached-password screening enabled, including source database and enforcement scope. Obtain audit logs or security event logs demonstrating blocked password attempts and timestamps of list updates. Capture test results from attempted use of known-breached passwords, including system rejection messages and corresponding log entries.
Pass criteria Breached-password screening is enabled across all authentication platforms in scope, configured to reject known-compromised passwords at creation and reset, with evidence of active enforcement through logs and successful test rejection of breached credentials.

Where this control is tested

Audit programs including this control