Let’s not sugarcoat it: if you’re still allowing passwords like “Quality2025!” or “GMPpassword!” anywhere in your regulated workflow, you’re inviting trouble. The era of security theater is over. Modern cyberattacks and regulatory requirements—from NIST to EU GMP Annex 11—demand far more than adding an exclamation point to a dictionary word. It’s time to understand not just why dictionary words are dangerous, but how smart password strategy (including password managers) is now a fundamental part of data integrity and compliance.
In my last post “Draft Annex 11’s Identity & Access Management Changes: Why Your Current SOPs Won’t Cut It”, I discussed the EU’s latest overhaul of Annex 11 as more than incremental: it’s a foundational reset for access control in GxP environments, including password management. In this post I want to expand on those points.
Dictionary Words = Easy Prey
Let’s start with why dictionary words are pure liability. Attackers don’t waste resources guessing random character strings—they leverage enormous “dictionary lists” sourced from real-world breaches, wordlists, and common phrases. Tools like Hashcat or John the Ripper process billions of guesses—including every English word and thousands of easy permutations—faster than you can blink.
This means that passwords like “Laboratory2025” or “Pharma@123” fall within minutes (or seconds) of an attack. Even a special character or a capital letter doesn’t save you, because password-cracking tools automatically try those combinations.
The Verizon Data Breach Investigations Report has put it plainly: dictionary attacks and credential stuffing remain some of the top causes for data compromise. If a GxP system accepts any plain-language word, it’s a red flag for any inspection—and a massive technical vulnerability.
What the Latest NIST Guidance Says
The definitive voice for password policy, the National Institute of Standards and Technology (NIST), made a seismic shift with Special Publication 800-63B (“Digital Identity Guidelines: Authentication and Lifecycle Management”). The relevant part:
“Verifiers SHALL compare…”
NIST 800-63B Section 5.1.1.2 requires your system to check a new password against lists of known bad, common, or compromised passwords—including dictionary words. If it pops up anywhere, it’s out.
But NIST also dispelled the notion that pure complexity (“$” instead of “S”, “0” instead of “o”) provides security. Their new mantra is:
- No dictionary words
- No user IDs, product names, or predictable info
- No passwords ever found in a breach
- BUT: do make them long, unique, and easy to use with a password manager
Dictionary Words vs. Passphrases: Not All Words Are Bad—But Phrases Must Be Random
Many people hear “no dictionary words” and assume they must abandon human language. Not so! NIST recommend passphrases made of multiple, unrelated words. For example, random combos like “staple-moon-fence-candle” are immune to dictionary attacks if they’re unguessable and not popular memes or in well-known breach lists.
A password like “correcthorse” is (in 2025) as bad as “password123”—it’s too common. But “refinery-stream-drifter-nomad” is good, provided it’s randomly generated.
Password Managers Are Now an Organizational Baseline
The move away from memorizing or writing down complex passphrases means you need password managers in your toolkit. As I pointed out in my post on password managers and data integrity, modern password management tools:
- Eliminate reuse by generating random, unique, breach-checked passwords for every system.
- Increase the length and randomness of credentials far beyond what humans will remember.
- Support compliance and auditing requirements—if you standardize (don’t let employees use their own random apps).
- Can even integrate with MFA (multi-factor authentication) for defense in depth.
Critically, as I discuss in the blog post, password manager selection, configuration, and validation are now GxP and audit-relevant. You must document what solutions are allowed (no “bring your own app”), how you test them, and periodic vulnerability and update checks.
What Are the Best Practices for Passwords in 2025?
Let’s lay it out:
- Block all dictionary words, product names, and user IDs.
Your system must reject any password containing recognizable words, no matter the embellishment. - Screen against breach data and block common patterns.
Before accepting a password, check it against up-to-date lists of compromised and weak passwords. - Prioritize password length (minimum 12–16 characters).
Random passphrases win. Four or more truly random words (not famous phrases) are vastly superior to gibberish or short “complex” passwords. - Push for password managers.
Make one or two IT-validated tools mandatory, make it simple, and do the qualification work. See my advice on password manager selection and qualification. - No forced periodic resets without cause.
NIST and ISO 27001 guidance agrees: only reset on suspicion or evidence of compromise, not on a schedule. Forced changes encourage bad habits. - Integrate MFA everywhere possible.
Passwords alone are never enough. Multi-factor authentication is the “fail-safe” for inevitable compromise. - Ongoing user education is vital.
Explain the risks of dictionary passwords and demonstrate how attack tools work. Show users—and your quality team—why policy isn’t just red tape.
Rewrite Your Password Policy—And Modernize Your Tools
Password security has never been just about meeting a checkbox. In regulated industries, your password policy is a direct reflection of your data integrity posture and audit readiness.
Embrace random, unique passphrases. Ban all dictionary words and known patterns. Screen every password against breach data—automatically. Standardize on organization-approved password managers and integrate with MFA whenever possible.
Regulatory expectations from NIST to new draft Annex 11 have joined cybersecurity experts in drawing a clear line: dictionary-word passwords are no longer just bad practice—they’re a compliance landmine.

2 thoughts on “Why Using Dictionary Words in Passwords Is a Data Integrity Trap—And What Real Security Looks Like”