Passwords are still the most commonly used method of authenticating end users, making them vulnerable to cyberthreats. That's why a robust incident response plan should include a process for doing a mass password reset, especially in the event of a ransomware or other major cyberattack.
Unfortunately, password resets are rarely top-of-mind for SOCs dealing with a crippling attack.
This article explains the processes and technologies involved in managing a mass password reset, with advice from Microsoft Incident Response.
Why is a mass password reset necessary?
A mass password reset becomes essential when a threat actor has gained extensive access to a customer's identity plane, particularly during incidents like ransomware attacks. Given the significant rise in password-based attacks—reportedly increasing tenfold in 2023—organizations must act swiftly to secure their systems and prevent unauthorized access.
What challenges arise during a mass password reset?
Organizations often encounter several challenges during a mass password reset, including overwhelming help desk calls from users facing authentication issues and the strain on IT staff managing the reset process. Additionally, the blend of remote and office work environments complicates the execution of resets, as organizations must balance the urgency of securing systems against the potential disruption to users.
How can organizations minimize disruption during a mass password reset?
To minimize disruption, organizations can implement self-service password reset (SSPR) options, allowing users to regain access quickly through alternative authentication methods. Utilizing Microsoft Entra ID capabilities can also streamline the process, enabling users to change their credentials securely at their next login. Additionally, employing multifactor authentication and monitoring login activities can further enhance security while reducing the load on IT support.