The password expired at midnight. Nobody noticed—until the system locked every admin account at 9:03 a.m.
Password rotation policies exist to protect systems from stolen credentials. Done wrong, they break workflows, block deployments, and cause outages. Done right, they reduce risk without disrupting stable operations. “Stable numbers” means knowing exactly when passwords change, how often, and across how many accounts, so you can predict impact like clockwork.
A stable number in password rotations is a fixed, well-defined interval—30 days, 60 days, 90 days—that applies system-wide. It is not subject to random changes, arbitrary resets, or ad-hoc overrides. This stability helps track usage patterns, align maintenance windows, and keep authentication logs clean for audits. Engineering teams can prepare for a rotation window rather than reacting to failures caused by irregular cycles.
The policy must define scope: