Control Authentication Mechanisms and Enforce Password Restrictions
You can choose different authentication mechanisms to control access to a system. In environments where many systems are involved, consider using a centralized authentication tool so that you don't need to maintain accounts across many different systems.
Also consider the different types of authentication mechanisms available. While password-level access can be convenient, you can secure an environment further by providing more restrictive mechanisms such as key, certificate, or token based authentication that often use 2-factor authentication.
When using password-style access, you can enforce restrictions to prevent common, short, or easily cracked passwords. Consider the NIST 800-63 Digital Identity Guidelines, which suggest deviating from traditional password policy. Rather than forcing complicated passwords with frequent expiry and forced system lockout, consider requiring passwords that aren't easy to guess or crack and are checked against known password dictionaries.
See Configuring User Authentication and Password Policies for more information.