Back to Blog
Best Practices9 min

Password Rotation: When and How Often Should You Change Them?

Evidence-based guidance on password rotation policies and best practices.

Introduction

For years, security experts recommended changing passwords every 90 days. But modern research shows this advice is outdated and can actually make security worse. In this evidence-based guide, we'll explain when you should (and shouldn't) rotate passwords.

The Old Advice (Outdated)

Traditional Policy

Legacy requirements:

  • Change passwords every 60-90 days
  • Can't reuse last 10 passwords
  • Must be "significantly different"

Found in:

  • Corporate IT policies
  • Government regulations
  • Banking systems
  • Legacy compliance standards

Why It Seemed Logical

The theory:

  • Limits damage from undetected breaches
  • Reduces window of opportunity
  • Forces users to update weak passwords
  • Meets compliance checkboxes

Why Forced Rotation Is Bad

1. Creates Weaker Passwords

User behavior:

Password1! → Password2! → Password3!
Summer2023! → Fall2023! → Winter2024!
MyPass1 → MyPass2 → MyPass3

Result: Predictable patterns that are easier to crack.

2. Encourages Password Reuse

When forced to change often:

  • Users cycle through same passwords
  • Use simple variations
  • Reuse across accounts
  • Write passwords down

3. Increases Help Desk Costs

Statistics:

  • 20-50% of help desk calls are password resets
  • Costs $70 per reset on average
  • Productivity loss from lockouts
  • User frustration

4. No Security Benefit

Research shows:

  • Doesn't prevent breaches
  • Doesn't limit damage
  • Creates false sense of security
  • Wastes resources

Modern Recommendations

NIST Guidelines (2017)

Official recommendation:

  • ❌ No periodic password changes
  • ✅ Change only when compromised
  • ✅ Focus on password strength
  • ✅ Enable multi-factor authentication

Quote from NIST SP 800-63B:

"Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically)."

Microsoft's Position (2019)

Removed from baseline:

  • No longer recommends periodic rotation
  • Focus on strong passwords
  • Emphasize 2FA
  • Monitor for breaches

UK NCSC (National Cyber Security Centre)

Guidance:

  • Regular password changing is "the annoying one"
  • Creates more problems than it solves
  • Focus on password quality
  • Use password managers

When You SHOULD Change Passwords

1. After a Breach

Immediate action required:

Site announces breach → Change password immediately

Steps:

  1. Change password on breached site
  2. Change password on any site where you reused it
  3. Enable 2FA
  4. Monitor account for suspicious activity

Tools:

  • Have I Been Pwned
  • Password manager breach alerts
  • Site notifications

2. If You Suspect Compromise

Warning signs:

  • Unrecognized login attempts
  • Unexpected password reset emails
  • Suspicious account activity
  • Device shows signs of malware

Action:

  1. Change password immediately
  2. Log out all devices
  3. Review recent activity
  4. Enable 2FA if not already active

3. If You Shared It

Scenarios:

  • Gave password to someone temporarily
  • Used on shared/public computer
  • Entered on potentially compromised device
  • Accidentally exposed (email, chat, etc.)

Action: Change password as soon as possible.

4. If It's Weak

Upgrade weak passwords:

Before: Password123!
After:  K9#mL2$pQ7@nR4!v

Use our Strong Password Generator to create strong replacements.

5. If You Reused It

Problem:

Email:    MyPassword123
Bank:     MyPassword123  ← Dangerous!

Solution:

Email:    K9#mL2$pQ7@nR4!v
Bank:     Xt8&Yz3*Bw6%Jq1^

Learn how to create unique passwords.

6. After Leaving a Job

Change immediately:

  • Personal email password
  • Banking passwords
  • Any shared work passwords you know

Why: Former employers may have records of your passwords.

When You DON'T Need to Change

1. "Just Because"

If your password is:

Then: No need to change it.

2. Calendar-Based Rotation

Don't change:

  • Every 90 days
  • Every 6 months
  • On your birthday
  • New year's resolution

Unless: There's a specific security reason.

3. Compliance Requirements

If policy requires rotation:

  • Follow policy (you have to)
  • But advocate for policy change
  • Show NIST guidelines to IT
  • Emphasize password quality over rotation

Password Lifespan by Account Type

Critical Accounts

Examples: Email, banking, password manager

Rotation schedule:

  • ❌ Not time-based
  • ✅ Only if compromised
  • ✅ Upgrade if weak

Requirements:

Important Accounts

Examples: Social media, work, cloud storage

Rotation schedule:

  • ❌ Not time-based
  • ✅ Only if compromised
  • ✅ Annual security audit

Requirements:

Standard Accounts

Examples: Shopping, forums, entertainment

Rotation schedule:

  • ❌ Not time-based
  • ✅ Only if compromised

Requirements:

  • 16 characters minimum
  • Randomly generated
  • Unique per site

Implementing Smart Rotation

1. Monitor for Breaches

Automated monitoring:

  • Have I Been Pwned notifications
  • Password manager breach alerts
  • Google/Microsoft security alerts

Action: Change password immediately when breach detected.

2. Annual Security Audit

Once per year:

  1. Review all passwords in password manager
  2. Check password strength scores
  3. Update any weak passwords
  4. Remove unused accounts
  5. Verify 2FA is enabled

Not rotation: Improving security posture.

3. Upgrade Weak Passwords

Identify weak passwords:

  • Less than 16 characters
  • Dictionary words
  • Personal information
  • Common patterns

Replace with:

4. Consolidate Reused Passwords

Find reused passwords: Most password managers have a "reused passwords" report.

Action: Generate unique password for each account.

Special Cases

Shared Passwords

Examples: Team accounts, family Netflix

Rotation schedule:

  • When someone leaves the team
  • After sharing with temporary user
  • If account shows suspicious activity

Best practice: Use password manager's sharing feature.

Service Account Passwords

Examples: Database, API keys, CI/CD

Rotation schedule:

  • Quarterly (if required by compliance)
  • After employee with access leaves
  • If credentials may have been exposed

Automation: Use secrets rotation tools.

Learn more about developer password management.

Legacy Systems

If system enforces rotation:

  1. Use maximum allowed length
  2. Generate random passwords
  3. Store in password manager
  4. Don't try to memorize

Advocate for policy change: Show NIST guidelines.

Rotation Workflow

When Breach Detected

1. Receive breach notification
2. Open password manager
3. Generate new password (16+ chars)
4. Update on website
5. Update in password manager
6. Log out all devices
7. Log back in to verify
8. Enable 2FA if not already active

Annual Audit

1. Open password manager
2. Run security audit/health check
3. Review weak passwords
4. Review reused passwords
5. Review old passwords (5+ years)
6. Update as needed
7. Remove unused accounts

Password Manager Features

Breach Monitoring

Built-in features:

  • Check against breach databases
  • Alert when password appears in breach
  • Prompt to change password

Supported by:

  • 1Password (Watchtower)
  • Bitwarden (Data Breach Report)
  • LastPass (Security Dashboard)
  • Dashlane (Password Health)

Security Audit

Reports available:

  • Weak passwords
  • Reused passwords
  • Old passwords
  • Compromised passwords
  • 2FA not enabled

Action: Address issues found.

Password History

Track changes:

  • See previous passwords
  • Know when changed
  • Revert if needed

Useful for: Troubleshooting login issues.

Common Questions

"My company requires 90-day rotation. What do I do?"

Short term: Comply with policy

Long term:

  • Advocate for policy change
  • Share NIST guidelines with IT
  • Propose alternative: Strong passwords + 2FA + breach monitoring

"Won't old passwords eventually be cracked?"

If password is strong:

  • 16+ characters with all types
  • Would take trillions of years to crack
  • Computing advances won't help significantly

If password is weak:

  • Already crackable
  • Rotation won't help
  • Need stronger password

"What about the 'time window' argument?"

Theory: Rotation limits damage window

Reality:

  • Breaches often undetected for months
  • 90 days doesn't help
  • Better: Monitor for breaches, respond immediately

"How do I remember which passwords to change?"

Don't remember:

Best Practices Summary

✅ DO

❌ DON'T

  • Change passwords "just because"
  • Follow arbitrary time schedules
  • Use predictable patterns
  • Reuse passwords
  • Write passwords down
  • Share passwords insecurely

Enterprise Recommendations

Modern Password Policy

✅ Minimum 12 characters (16+ recommended)
✅ No complexity requirements (encourages length)
✅ No periodic rotation
✅ Check against breach databases
✅ Require 2FA for sensitive access
✅ Provide password manager
✅ Monitor for suspicious activity
✅ Change only when compromised

Legacy Policy (Outdated)

❌ Minimum 8 characters
❌ Must include uppercase, lowercase, number, symbol
❌ Change every 90 days
❌ Can't reuse last 10 passwords
❌ Must be "significantly different"

Learn more about enterprise password policies.

Measuring Success

Good Security Posture

Indicators:

  • All passwords are strong (16+ chars)
  • All passwords are unique
  • 2FA enabled on critical accounts
  • Breach monitoring active
  • No help desk password reset calls
  • Users satisfied with system

Poor Security Posture

Indicators:

  • Frequent password resets
  • Users writing passwords down
  • Predictable password patterns
  • High help desk costs
  • User complaints
  • No breach monitoring

Conclusion

Modern password rotation strategy:

Change when compromised (breach, suspicious activity)
Upgrade weak passwords (annual audit)
Make unique (no reuse)
Use strong passwords (16+ characters)
Enable 2FA (critical accounts)
Monitor breaches (automated alerts)

Don't change on schedule (90 days, 6 months, etc.)
Don't use patterns (Password1, Password2)
Don't reuse (same password everywhere)

Bottom line: Focus on password quality, not rotation frequency.

Ready to create strong passwords that don't need frequent rotation? Use our Strong Password Generator to generate secure passwords instantly.

Related Reading

Ready to Create a Strong Password?

Use our free Strong Password Generator to create secure passwords instantly.