Password reviews are part of the security ritual in many organizations: they serve to demonstrate compliance, reduce obvious risks and show that basic controls exist. However, too often these exercises are limited to checking standards of complexity and expiry dates, and that leaves out much of the routes that the attackers really follow.
The strength of a password out of context does not stop a real attack. A key that meets the formal requirements - minimum length, character mix, periodic rotation - can remain highly vulnerable if it has been reused in other services, if it contains predictable patterns related to the company, or if it has already been filtered into a gap. This is why modern recommendations, such as the NIST SP 800-63B, they insist on checking credentials against committed password lists in addition to applying complexity rules.

The usual practice of comparing passwords only with a list of rules leaves a dangerous window: an employee can have a password that seems "strong" on the paper and that, however, has been previously filtered. The attackers exploit precisely that, reusing credentials obtained in one service to access others. Research on reuse attacks and stuffing of credentials and resources such as Have I Been Pwned show how huge volumes of credentials circulate in illicit markets and allow intrusions without the need to "break" a modern password.
Routine controls overlook orphan and forgotten accounts. Many audits focus only on the current payroll: active accounts linked to payroll employees or known systems. In real environments, however, there are accounts of former employees, contractors, test environments or external identities that are not synchronized with RR resources. HH and which rarely appear in normal reports. These accounts often have more laxity controls: old passwords, absence of MFA or obsolete permissions, making them attractive targets for an attacker who seeks to avoid alarms in privileged accesses.
Similarly, service accounts represent a critical risk where they are outside the scope of user-oriented audits. These identifiers often need extensive permissions and are sometimes configured with passwords that do not expire to avoid operational interruptions. This combination - high privileges and permanent credentials - offers an intruder an ideal opportunity to maintain a presence in the environment without activating the same controls that apply to human sessions.
Another important limit of traditional audits is their timely nature. A report collects the status of passwords at a specific time, but threats related to credentials evolve continuously. The phenomenon known as credential stuffing illustrates this: attackers use user pairs / password filtered into a gap to test access to other services, so an account can be perfectly "fulfilling" the morning of the analysis and be compromised that same night. Organizations with public portals or large numbers of users are particularly vulnerable to such attacks, which is why entities such as OWASP they recommend continuous detection and response approaches.
What should change in audits so that they really reduce risk? First, incorporate the screening against filtered and updated password bases. The usual complexity check must be completed by a verification that blocks credentials that already circulate in public or private gaps. In addition, organizations need to prioritize by risk: not all accounts have the same value for an attacker, so the focus should be on privileged identities, critical services and access with external exposure.
It is also essential to expand the scope of the reviews to include inactive accounts, external identities and any account that is not linked to the RR-managed life cycle. HH or the corporate directory. This effort combined with regular access reviews and automated disarrangement processes reduces the likelihood that an orphan account will be the gateway to sensitive environments.
In the case of non-human or service accounts, static passwords should be removed whenever possible by placing secrets in safe vaults and by applying automatic rotation and minimum privilege principles. These measures make it extremely difficult for a service credential to allow long and unnoticed access.
Monitoring must be continuous, not timely. Incorporate monitoring that continuously checks credentials against new filtered data collections, detect unusual login patterns and correlate events with abuse signals makes the audit no longer a process and becomes an active operational control. Complementing this with MFA resilience assessments helps to ensure that even if a password is compromised, the second layer of defense continues to protect critical access.

There are solutions that automate and systematize these processes, integrating directory scans in read-only mode, filtered password check and account detection with obsolete or inactive permissions. Adopting tools thus makes it easier for security teams to meet regulatory requirements without reducing defensive ambition: passing audits should no longer be enough, the real objective is to increase friction for attackers and reduce the exposure window.
The incident statistics support this approach: reports of data violations place stolen or committed credentials as one of the most frequent causes of intrusion. For example, the Verizon Data Breach Investigations Report continues to show the relevant role of credentials in the incidents investigated.
In short, an effective password audit is not limited to checking formal rules. It must contextualize the strength of the passwords with information of gaps, prioritize according to the real risk of the accounts, cover forgotten and non-human identities, and operate continuously. Only in this way will organizations come out of the comfort of "fulfilling politics" and move to a position that really complicates the attackers' life. For those who manage corporate directories and Active Directory there are commercial options and market tools that implement many of these practices and allow to start closing these gaps without disrupting the daily operation; if you want, I can identify resources and guides to compare solutions or explain how to design a transition plan to continuous and risk-based audits.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...