Mechanisms exist to change authentication credentials: (1) At predefined intervals; and/or (2) Upon suspicion of credential compromise.
Does the organization change authentication credentials: (1) At predefined intervals; and/or (2) Upon suspicion of credential compromise?