Security basics
NIST 800-63B Password Rules: Modern Password Policy Guidelines

NIST 800-63B redefines password security by prioritizing usability and entropy over arbitrary complexity. This guide explains the modern password rules and how they align with current best practices for authentication.
Need-to-know reading
2 min readUpdated: 03/27/2026Author: GeneratePasswordTo Editorial Team
Key Changes in NIST 800-63B
NIST 800-63B represents a significant shift in how organizations approach password security. Traditional practices, such as frequent mandatory password changes and strict complexity requirements, have proven to be less effective in real-world scenarios and often lead to poor user experiences. Users would create predictable variations of previous passwords or write them down, which defeats the purpose of the security measures. The updated guidelines focus on usability, memorability, and the true strength of passwords, measured by entropy rather than arbitrary character rules.
One of the most important updates is the emphasis on passphrases. Instead of requiring a mix of uppercase letters, numbers, and symbols in short passwords, NIST 800-63B encourages the use of longer, memorable phrases that are easy for users to recall but difficult for attackers to guess. For example, a passphrase like 'CorrectHorseBatteryStaple' provides high entropy due to its length and unpredictability, making brute-force or dictionary attacks much less effective than short, complex passwords like 'P@ssw0rd!23'.
Another key element is user-friendly password policies. Users should be able to select passwords or passphrases that they can remember without resorting to insecure coping mechanisms like writing passwords on sticky notes or using the same password across multiple accounts. Allowing personal choice, combined with guidance on strong passphrases, increases security by promoting behaviors that users are more likely to follow consistently.
Multi-factor authentication (MFA) is also strongly recommended for high-risk systems. By requiring an additional authentication factor beyond the password, organizations can significantly reduce the likelihood of unauthorized access, even if a password is compromised. This approach shifts the reliance from a single secret to a combination of something the user knows, has, or is, creating a more resilient authentication framework.
Additionally, NIST 800-63B advises against other outdated practices such as composition rules, arbitrary password expiration, and password hints. Removing these burdens not only improves user satisfaction but also strengthens security by reducing predictable patterns and risky behavior. Systems are encouraged to implement mechanisms such as screening passwords against commonly used or compromised lists and blocking repeated passwords from being reused immediately.
In summary, NIST 800-63B modernizes password policies by prioritizing memorability, entropy, and multi-factor protection over rigid complexity rules. Organizations implementing these guidelines can achieve a balance between strong security and usability, ultimately reducing the risk of breaches while supporting a better user experience.
- No forced password expiration, reducing predictable password changes.
- Encouragement to use long passphrases instead of short, complex passwords.
- User-friendly policies that support memorability and secure choice.
- Mandatory MFA for high-risk or sensitive systems.
- Screening passwords against commonly used or compromised passwords.
- Elimination of outdated complexity rules and password hints.
Related guidance