Enterprise Password Management for Medium to Large Organizations

Derek A. Smith, Founder, National Cybersecurity Education Center
January 31st, 2017

Password Management for Medium to Large Organizations

Last month, I hosted a webinar ‘Password Management for Medium to Large Organizations: Guidance for IT Security Policy and Network Infrastructure Design Decisions’This blog is an overview of that webinar. To learn more, check out the webinar here.

Enterprise Password Management for Medium to Large Organizations

Today’s business environments are dynamic and constantly evolving. Due to this change, it’s critical for organizations of all sizes to ensure that all their data is kept secure by using some form of effective password management system and processes. Passwords, after all, are your last lines of defense against determined intruders.

When it comes to passwords, I often wonder why we even still use them. There are so many alternatives available, like smart cards, biometrics and tokens, that we can choose from.  However, due to passwords being inexpensive to use, compatibility issues with alternatives choices, and the expense of these alternatives, passwords are unlikely to be replaced anytime soon. So if we have to keep using password anyway, we should use them in the safest way possible and I want to provide you with some methods for doing so.

User Authentication and Passwords

There are essentially 3 types of credentials from which users can choose – 1) something they know, such as a secret password; 2) something they have, like a physical device or a “smart card”; 3) or something they are, such as their fingerprints or retina scans. It is generally more secure to combine these elements into a multiple factor solution, like providing both a password and a finger print.

Password Security Threats

Password are simply secret words or phrases that employees know and they can be compromised in a number of ways such as:

  • Employees writing them down and losing them
  • Attackers guessing employee’s passwords, and
  • Attackers stealing employee’s passwords

The biggest problem with passwords is that they can be broken fairly easily through brute-force and dictionary attacks. Programs like John the Ripper and L0phtCrack are used to crack even the most complex passwords. Once an attacker obtains employees passwords, by whatever means, they have an opportunity to impersonate that employee to gain entry into company networks and resources, and consequently company secrets.

The Human Element

Unfortunately, employees often have many passwords they have to remember, each protecting accounts on different systems or applications. Therefore, human nature also makes passwords insecure. When employees have trouble remembering passwords they often resort to:

  • Writing down their passwords
  • Forgetting their passwords
  • Choosing very simple, easily compromised passwords or reusing old passwords

Therefore, any enterprise password management practices a firm adopts must take human limitations into consideration.

One of the weaknesses I mentioned above is that passwords can be guessed rather easily, especially if an attacker is using password cracking software easily available for download from the internet. To combat a password guessing attack employees should construct hard to guess passwords.  Some industry best practices for choosing hard to guess passwords include:

  • Use passwords that are at least seven characters long
  • Passwords must contain at least one lowercase letter, at least one uppercase letter and at least one digit and if possible, passwords must contain at least one punctuation mark, so long as there are many (10 or more) available punctuation marks

To eliminate easy to guess passwords, passwords should not:

  • Contain the employee’s name or login ID
  • Contain a dictionary word, in any language that employees can reasonably be expected to know.

Should an employee’s passwords be compromised, the usefulness of those compromised passwords should be limited! This can be done by such practices as:

  • Forcing employees to change them regularly (like every 30,60, or 90 days.)
  • Having password expire at a certain interval, such as every 60 days.
  • Preventing users from reusing old passwords.

The Bottom Line

Passwords are intended to reliably differentiate the authorized employee from imposters, and therefore must be kept secret.  An organization’s password policy should forbid behaviors such as employees being able to choose passwords that are easily guessed, password sharing, or writing down passwords, and there must be consequences for doing so.  But to best help employees comply with good password behavior, besides and effective password policy, firms should consider using user friendly password management tools and processes. Password managers store employee login information for all the resources they use and help them log into them automatically. They encrypt the company’s password database with a master password making the master password all you have to remember. This allows for management of many log-ins while keeping them as secure as possible.

By using an enterprise password manager, like PowerBroker Password Safe, organizations will be better equipped to prevent a hacker from misusing employee passwords to obtain private information. Solid, secure and respectful password management is not only important to an enterprise, but it is also respectful to the employees, ensuring that their identity may not be used in a malicious manner and that company secrets remain secret.

Learn more in this on-demand webinar ‘Password Management for Medium to Large Organizations: Guidance for IT Security Policy and Network Infrastructure Design Decisions’Or you if you’d like more information on PowerBroker Password Safe, request a free trial today.

Derek A. Smith, Founder, National Cybersecurity Education Center

Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently the Director of Cybersecurity Initiatives for the National Cybersecurity Institute at Excelsior College, responsible to perform complex duties relating to the development and coordination of cyber initiatives at NCI. Formerly, he has worked for a number of IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He has also taught business and IT courses at several universities for over 20 years. Derek has served in the US Navy, Air Force and Army for a total of 24 years. He completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education.