WikiFrameworksCyberSecure CanadaPassword Change on Compromise

Password Change on Compromise

Updated: 2026-02-25

Plain English Translation

Organizations must force users to change their passwords immediately if there is any suspicion or proof that their account has been compromised. A prompt password reset policy prevents unauthorized access and limits potential damage during a security incident.

Executive Takeaway

Enforcing password changes upon suspected compromise is a critical incident response step to block attackers from maintaining access.

ImpactHigh
ComplexityLow

Why This Matters

  • Immediately revokes unauthorized access to compromised accounts.
  • Limits data exposure and lateral movement during an active breach.
  • Demonstrates proactive incident response to regulators and auditors.

What “Good” Looks Like

  • Automated triggers to force password resets on compromised accounts, with evidence and ownership tracked in tools like WatchDog Security's Compliance Center.
  • Session tokens and active sessions are revoked simultaneously with the password reset.
  • Clear, approved communication to users about the reset without creating phishing risks; tools like WatchDog Security's Policy Management can manage templates, reviews, and approval history.

You should force a password reset immediately upon detection or reasonable suspicion that an account's credentials have been exposed or unauthorized access has occurred.

Suspicion includes irregular login locations, impossible travel alerts, detection of credentials in a dark web dump, or a user reporting a successful phishing attempt.

You must define clear triggers in your incident response plan and have the technical capability to force password resets and revoke active sessions for affected users. Tools like WatchDog Security's Compliance Center can map this requirement to actionable tasks, assign owners, and track supporting evidence (e.g., reset logs and incident tickets) for audit readiness.

Typically, only the affected accounts require a reset unless the scope of the breach is unknown or there is evidence of a widespread directory compromise.

Passwords must be changed as soon as the exposure is suspected to minimize the window of opportunity for an attacker to access the network.

Administrators can check the User must change password at next logon box in Active Directory, or use the Require re-register MFA and Reset password options in Entra ID.

Yes, revoking active sessions and tokens is critical because attackers can use existing sessions to maintain access even after the password change after breach.

Maintain audit logs of the administrative action triggering the reset, helpdesk tickets documenting the incident, and system logs showing the user successfully authenticating with a new password. Tools like WatchDog Security's Compliance Center can centralize these artifacts, request missing evidence, and generate an auditor-friendly evidence package.

Contact users through an out-of-band method, such as a direct phone call or an in-person conversation, and instruct them to navigate directly to the official portal rather than clicking a link.

You should ensure multi-factor authentication is active, monitor the account for unusual post-reset activity, and verify that no malicious mailbox forwarding rules or backdoors were created.

Auditors typically expect you to show the trigger (alert, report, or investigation note), the administrative action that enforced the reset, and the resulting authentication/session-revocation logs. Tools like WatchDog Security's Compliance Center can link these artifacts to the control, assign remediation tasks, and keep an evidence trail you can export for audits.

Consistency reduces mistakes during time-sensitive incidents and helps avoid phishing-like communications. Tools like WatchDog Security's Policy Management can maintain approved procedures and user-facing templates with version control, review workflows, and acknowledgement tracking so teams follow the same playbook.

CYBERSECURE-CANADA Section 5.5.2.2

"The organization shall enforce password changes on suspicion or evidence of compromise."

VersionDateAuthorDescription
1.0.02026-02-25WatchDog Security GRC TeamInitial publication