The alarm goes off at 2:17 a.m. The on-call engineer reaches for the laptop. Access fails. The password expired at midnight.
Password rotation policies protect systems from credential theft, but they can also block urgent production intervention. When an engineer is paged into a live incident, wasted seconds become downtime, and downtime becomes loss. Balancing security controls with real-time access is key.
Many teams use fixed rotation schedules—every 30, 60, or 90 days—regardless of operational context. This approach satisfies compliance audits but risks interrupting critical workflows, especially for on-call duty. The problem grows in environments where passwords guard VPNs, bastion hosts, or root accounts.
Modern security practice can adapt. Rotation should be event-driven and integrated with automated credential refresh systems. Access tokens and managed secrets can replace static passwords. Identity providers can enforce rotation without manual intervention, ensuring that any engineer with valid on-call status has working credentials at any moment.