Password Rotation: When and How Often Should You Change Them?
Evidence-based guidance on password rotation policies and best practices.
Introduction
For years, security experts recommended changing passwords every 90 days. But modern research shows this advice is outdated and can actually make security worse. In this evidence-based guide, we'll explain when you should (and shouldn't) rotate passwords.
The Old Advice (Outdated)
Traditional Policy
Legacy requirements:
- Change passwords every 60-90 days
- Can't reuse last 10 passwords
- Must be "significantly different"
Found in:
- Corporate IT policies
- Government regulations
- Banking systems
- Legacy compliance standards
Why It Seemed Logical
The theory:
- Limits damage from undetected breaches
- Reduces window of opportunity
- Forces users to update weak passwords
- Meets compliance checkboxes
Why Forced Rotation Is Bad
1. Creates Weaker Passwords
User behavior:
Password1! → Password2! → Password3!
Summer2023! → Fall2023! → Winter2024!
MyPass1 → MyPass2 → MyPass3
Result: Predictable patterns that are easier to crack.
2. Encourages Password Reuse
When forced to change often:
- Users cycle through same passwords
- Use simple variations
- Reuse across accounts
- Write passwords down
3. Increases Help Desk Costs
Statistics:
- 20-50% of help desk calls are password resets
- Costs $70 per reset on average
- Productivity loss from lockouts
- User frustration
4. No Security Benefit
Research shows:
- Doesn't prevent breaches
- Doesn't limit damage
- Creates false sense of security
- Wastes resources
Modern Recommendations
NIST Guidelines (2017)
Official recommendation:
- ❌ No periodic password changes
- ✅ Change only when compromised
- ✅ Focus on password strength
- ✅ Enable multi-factor authentication
Quote from NIST SP 800-63B:
"Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically)."
Microsoft's Position (2019)
Removed from baseline:
- No longer recommends periodic rotation
- Focus on strong passwords
- Emphasize 2FA
- Monitor for breaches
UK NCSC (National Cyber Security Centre)
Guidance:
- Regular password changing is "the annoying one"
- Creates more problems than it solves
- Focus on password quality
- Use password managers
When You SHOULD Change Passwords
1. After a Breach
Immediate action required:
Site announces breach → Change password immediately
Steps:
- Change password on breached site
- Change password on any site where you reused it
- Enable 2FA
- Monitor account for suspicious activity
Tools:
- Have I Been Pwned
- Password manager breach alerts
- Site notifications
2. If You Suspect Compromise
Warning signs:
- Unrecognized login attempts
- Unexpected password reset emails
- Suspicious account activity
- Device shows signs of malware
Action:
- Change password immediately
- Log out all devices
- Review recent activity
- Enable 2FA if not already active
3. If You Shared It
Scenarios:
- Gave password to someone temporarily
- Used on shared/public computer
- Entered on potentially compromised device
- Accidentally exposed (email, chat, etc.)
Action: Change password as soon as possible.
4. If It's Weak
Upgrade weak passwords:
Before: Password123!
After: K9#mL2$pQ7@nR4!v
Use our Strong Password Generator to create strong replacements.
5. If You Reused It
Problem:
Email: MyPassword123
Bank: MyPassword123 ← Dangerous!
Solution:
Email: K9#mL2$pQ7@nR4!v
Bank: Xt8&Yz3*Bw6%Jq1^
Learn how to create unique passwords.
6. After Leaving a Job
Change immediately:
- Personal email password
- Banking passwords
- Any shared work passwords you know
Why: Former employers may have records of your passwords.
When You DON'T Need to Change
1. "Just Because"
If your password is:
- Strong and random (16+ characters)
- Unique to this account
- Never compromised
- Protected by 2FA
Then: No need to change it.
2. Calendar-Based Rotation
Don't change:
- Every 90 days
- Every 6 months
- On your birthday
- New year's resolution
Unless: There's a specific security reason.
3. Compliance Requirements
If policy requires rotation:
- Follow policy (you have to)
- But advocate for policy change
- Show NIST guidelines to IT
- Emphasize password quality over rotation
Password Lifespan by Account Type
Critical Accounts
Examples: Email, banking, password manager
Rotation schedule:
- ❌ Not time-based
- ✅ Only if compromised
- ✅ Upgrade if weak
Requirements:
- 20-32 characters
- Randomly generated
- 2FA enabled
- Monitored for breaches
Important Accounts
Examples: Social media, work, cloud storage
Rotation schedule:
- ❌ Not time-based
- ✅ Only if compromised
- ✅ Annual security audit
Requirements:
- 16-20 characters
- Randomly generated
- 2FA recommended
Standard Accounts
Examples: Shopping, forums, entertainment
Rotation schedule:
- ❌ Not time-based
- ✅ Only if compromised
Requirements:
- 16 characters minimum
- Randomly generated
- Unique per site
Implementing Smart Rotation
1. Monitor for Breaches
Automated monitoring:
- Have I Been Pwned notifications
- Password manager breach alerts
- Google/Microsoft security alerts
Action: Change password immediately when breach detected.
2. Annual Security Audit
Once per year:
- Review all passwords in password manager
- Check password strength scores
- Update any weak passwords
- Remove unused accounts
- Verify 2FA is enabled
Not rotation: Improving security posture.
3. Upgrade Weak Passwords
Identify weak passwords:
- Less than 16 characters
- Dictionary words
- Personal information
- Common patterns
Replace with:
- Strong, random passwords
- Generated by our Strong Password Generator
4. Consolidate Reused Passwords
Find reused passwords: Most password managers have a "reused passwords" report.
Action: Generate unique password for each account.
Special Cases
Shared Passwords
Examples: Team accounts, family Netflix
Rotation schedule:
- When someone leaves the team
- After sharing with temporary user
- If account shows suspicious activity
Best practice: Use password manager's sharing feature.
Service Account Passwords
Examples: Database, API keys, CI/CD
Rotation schedule:
- Quarterly (if required by compliance)
- After employee with access leaves
- If credentials may have been exposed
Automation: Use secrets rotation tools.
Learn more about developer password management.
Legacy Systems
If system enforces rotation:
- Use maximum allowed length
- Generate random passwords
- Store in password manager
- Don't try to memorize
Advocate for policy change: Show NIST guidelines.
Rotation Workflow
When Breach Detected
1. Receive breach notification
2. Open password manager
3. Generate new password (16+ chars)
4. Update on website
5. Update in password manager
6. Log out all devices
7. Log back in to verify
8. Enable 2FA if not already active
Annual Audit
1. Open password manager
2. Run security audit/health check
3. Review weak passwords
4. Review reused passwords
5. Review old passwords (5+ years)
6. Update as needed
7. Remove unused accounts
Password Manager Features
Breach Monitoring
Built-in features:
- Check against breach databases
- Alert when password appears in breach
- Prompt to change password
Supported by:
- 1Password (Watchtower)
- Bitwarden (Data Breach Report)
- LastPass (Security Dashboard)
- Dashlane (Password Health)
Security Audit
Reports available:
- Weak passwords
- Reused passwords
- Old passwords
- Compromised passwords
- 2FA not enabled
Action: Address issues found.
Password History
Track changes:
- See previous passwords
- Know when changed
- Revert if needed
Useful for: Troubleshooting login issues.
Common Questions
"My company requires 90-day rotation. What do I do?"
Short term: Comply with policy
Long term:
- Advocate for policy change
- Share NIST guidelines with IT
- Propose alternative: Strong passwords + 2FA + breach monitoring
"Won't old passwords eventually be cracked?"
If password is strong:
- 16+ characters with all types
- Would take trillions of years to crack
- Computing advances won't help significantly
If password is weak:
- Already crackable
- Rotation won't help
- Need stronger password
"What about the 'time window' argument?"
Theory: Rotation limits damage window
Reality:
- Breaches often undetected for months
- 90 days doesn't help
- Better: Monitor for breaches, respond immediately
"How do I remember which passwords to change?"
Don't remember:
- Use password manager
- Enable breach monitoring
- Let tools alert you
Best Practices Summary
✅ DO
- Change passwords after breaches
- Use strong, random passwords
- Enable 2FA everywhere
- Use password manager
- Monitor for breaches
- Annual security audit
- Make each password unique
❌ DON'T
- Change passwords "just because"
- Follow arbitrary time schedules
- Use predictable patterns
- Reuse passwords
- Write passwords down
- Share passwords insecurely
Enterprise Recommendations
Modern Password Policy
✅ Minimum 12 characters (16+ recommended)
✅ No complexity requirements (encourages length)
✅ No periodic rotation
✅ Check against breach databases
✅ Require 2FA for sensitive access
✅ Provide password manager
✅ Monitor for suspicious activity
✅ Change only when compromised
Legacy Policy (Outdated)
❌ Minimum 8 characters
❌ Must include uppercase, lowercase, number, symbol
❌ Change every 90 days
❌ Can't reuse last 10 passwords
❌ Must be "significantly different"
Learn more about enterprise password policies.
Measuring Success
Good Security Posture
Indicators:
- All passwords are strong (16+ chars)
- All passwords are unique
- 2FA enabled on critical accounts
- Breach monitoring active
- No help desk password reset calls
- Users satisfied with system
Poor Security Posture
Indicators:
- Frequent password resets
- Users writing passwords down
- Predictable password patterns
- High help desk costs
- User complaints
- No breach monitoring
Conclusion
Modern password rotation strategy:
✅ Change when compromised (breach, suspicious activity)
✅ Upgrade weak passwords (annual audit)
✅ Make unique (no reuse)
✅ Use strong passwords (16+ characters)
✅ Enable 2FA (critical accounts)
✅ Monitor breaches (automated alerts)
❌ Don't change on schedule (90 days, 6 months, etc.)
❌ Don't use patterns (Password1, Password2)
❌ Don't reuse (same password everywhere)
Bottom line: Focus on password quality, not rotation frequency.
Ready to create strong passwords that don't need frequent rotation? Use our Strong Password Generator to generate secure passwords instantly.
Related Reading
Ready to Create a Strong Password?
Use our free Strong Password Generator to create secure passwords instantly.
Related Articles
Best Practices for Managing 100+ Passwords (Without Losing Your Mind)
Practical strategies for managing dozens or hundreds of unique passwords.
Avoiding Patterns: Common Mistakes in Self-Made Passwords
Discover the most common password patterns and how to avoid them.
The Ultimate Guide to Symbols in Strong Passwords
Everything you need to know about using special characters in passwords.