diff --git a/modules/varbase_features/varbase_security/varbase_security.module b/modules/varbase_features/varbase_security/varbase_security.module
new file mode 100644
index 0000000000000000000000000000000000000000..6d30fc7b7919a69144dedaa334b6a6d6cff978b0
--- /dev/null
+++ b/modules/varbase_features/varbase_security/varbase_security.module
@@ -0,0 +1,37 @@
+<?php
+
+/**
+ * @file
+ * Contains varbase_security.module.
+ */
+ use Drupal\password_policy\Entity\PasswordPolicy;
+ use Drupal\Core\Entity\EntityInterface;
+ use Drupal\Core\Form\FormStateInterface;
+ use Drupal\user\Entity\User;
+ use Drupal\Component\Utility\Crypt;
+ use Symfony\Component\HttpKernel\Exception\AccessDeniedHttpException;
+
+/**
+ * Implements hook_form_FORM_ID_alter() for user_form().
+ */
+function varbase_security_form_user_form_alter(&$form, &$form_state) {
+  if (\Drupal::moduleHandler()->moduleExists('password_policy')) {
+    if (isset($form['account']['password_policy_status'])) {
+      unset($form['account']['password_policy_status']);
+    }
+  }
+}
+
+/**
+ * Implements hook_element_info_alter().
+ */
+function varbase_security_element_info_alter(array &$types) {
+  if (\Drupal::moduleHandler()->moduleExists('password_policy')) {
+    if (isset($types['password_confirm'])) {
+      if (isset($types['password_confirm']['#process'][1])
+         && $types['password_confirm']['#process'][1] == 'password_policy_check_constraints_password_confirm_process') {
+        unset($types['password_confirm']['#process'][1]);
+      }
+    }
+  }
+}