Encrypted Password Storage Solution

Associate
Joined
16 Aug 2012
Posts
226
Hey guys, the business I am currently working for retains all of their passwords in their heads and they're all very easy to break. What I would like to put in is a password retention solution, so they can use better passwords, but retain them in a database for reference if forgotten.

What would be the best solution?

Password protected/encrypted excel document in cold storage?

Password protected/encrypted excel in a sterile file location on a server?

Cloud based storage?

Also, what would be the most SECURE solution?

Cheers guys!
 
We use KeePass. File is held on a share restricted to certain users. Not suggesting it's the best solution, but it's encrypted and free. It also handles multiple users making changes and syncs all users changes back to the file.
 
Not a software engineer or anything, but because this is open source, would it not be possible for black hats to reverse engineer the custom encryption process?
 
Not a software engineer or anything, but because this is open source, would it not be possible for black hats to reverse engineer the custom encryption process?

Knowing how something was encrypted doesn't give you the key that is required to decrypt it.
 
Not a software engineer or anything, but because this is open source, would it not be possible for black hats to reverse engineer the custom encryption process?

Well technically the encryption process isn't 'custom', it uses standard known encryption algorithms to encrypt things.

Basically Kerckhoffs's principle applies here:

A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

http://en.wikipedia.org/wiki/Kerckhoffs's_principle

Now where there can be issues is with the implementation of the crypto system, it's all very well using a tried and tested algorithm but for example if the key generation is flawed and predictable it then doesn't matter ;) It's usually the implementation that can let a cryptosystem down.
 
Last edited:
We have used Keypass in the past but don't now because it doesn't have individual user accounts to access and hence no audit trail of exactly who is access which password when. Of course that may not be an issue in your environment in which case I would suggest it too.

(I can't say what we use now)
 
If you want true single sign-on with a built in password vault, so your users can access applications without even having to type the password in, you need to look at solutions like the following:

Oracle ESSO: http://www.oracle.com/us/products/m...ent/oracle-enterprise-sso/overview/index.html

Imprivata OneSign: http://www.imprivata.co.uk/

Evidian SSO: http://www.evidian.com/products/enterprise-sso/

Plus with these you can get provisioning, i.e. you as an admin can 'send' new or modified passwords directly to the user so they can use them without even knowing what the passwords are - great if you're onboarding new applications.
 
Knowing how something was encrypted doesn't give you the key that is required to decrypt it.

True, I don't even know why I asked the question really - Just wanted to be sure!

I'm building a database with Keypass now, seems like a good enough solution and it complies with PCI so we should be covered!
 
A product can't "comply with PCI", for what it's worth. Only your working practises can.

KeePass wouldn't "comply with PCI" if you left the database and the key file on a publicly accessible share for instance.
 
It would also run into issues that the authentication to access the Keypass database is shared and hence is equivalent to a shared password. Combine that with no auditing of what passwords have been accessed once the you have logged into Keypass with the shared credentials means you would likely be looking at a PCI audit failure.
 
I use keepass put the keyfile on a domain auth protected area on network storage as well as a password. Then we all access the same file. It is only me that modifies the file. If you realy wanted to i guess you could change the permissions on the keepass file so that only one person has write access. Never done that though but i don't see why it would not work like any other file.
 
Back
Top Bottom