Information
According to CERT.org, a security policy provides a framework for making specific decisions, such as which defense mechanisms to use and how to con gure services. It is the basis for developing secure programming guidelines and procedures for users and system administrators alike. With a security policy in place you can create security checklists that contain lists of security practices that are specific to your organization.
Solution
Configure password complexity to use SHA1 for password storage.
user@host# edit system login password
user@host# set format sha1