/. Recently published a post covering a draft NIST Standard that is in review . This handler thought it would cause a disturbance in the force, but so far no one is discussing it. One of the big stand out changes is no more periodic password changes . There are several others as well, and CSO Online has a fantastic summary review .
There are some clear differences that stand out right away in the introduction. As with most things, standards evolve as we learn.
Original introduction (first 3 sentences)
Draft Publication Introduction (first 3 sentences)
The new draft goes on from there to outline digital identity and attempts to clearly define access and uses more risk based language.
One clear change that will shock users is the removal of periodic password changes. The handlers agree that a strong review of this draft is in order for security professionals as we can hear the users now:
“Wait, you have been forcing me to change my passwords ALL THIS time, and now your saying it is not needed?”
Another section that should be reviewed and discussed deeply is 5.2.7 Verifier Compromise Resistance. According to the section there should be some mechanism to verify compromise resistance. One could interpret this to run passwords against breached credential databases, however this is not specifically called out  .
In conclusion, this standard is a strong deviation from previous recommendations and should be reviewed for impact to your security practice. (There is that disturbance in the force we were looking for).
May 17th 2017
6 days ago
I've thought periodic forced changes are counter productive for a long time.
* If someone breaks into a computer, the first thing they generally do is establish a backdoor. They then don’t need the user’s password.
* I have seen lots of malware that sets itself to autorun when the user logs in. It doesn’t need the user’s password. Changing the password won’t even slow it down.
* Some attackers create their own account if they get high enough access. They no longer care about the user’s password.
* Users will just change them in rather predictable ways, so even if the attacker did need it, it wouldn’t be hard to reacquire.
* The malware can install a keylogger that will effectively send the new password right back to the attacker.
Even Microsoft is coming around. "...Eliminate mandatory periodic password resets for user accounts..." (https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf)
And this doesn't even consider the biggest (although not the only one) threat is ransomware, which doesn't try to mess with passwords (yet).
May 18th 2017
5 days ago