Mechanisms exist to enforce complexity, length and lifespan considerations to ensure strong criteria for password-based authentication.
Does the organization enforce complexity, length and lifespan considerations to ensure strong criteria for password-based authentication?