S 4.306 Handling of password storage tools

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, User

Most people need to remember a number of passwords, PINs, and other confidential authentication information for use at work as well as for private use. This always leads to problems. Typical examples of such problems include users forgetting their password, which then requires complex procedures to be performed to reset the passwords, or users writing down their passwords and then storing them insecurely.

To avoid such problems, there are products available for use as a technical aid to enable the administration of numerous passwords, PINs and other confidential authentication information. Such password storage tools, which are also referred to as password safes, are available as pure software solutions as well as in combination with separate hardware. Various aspects need to be taken into account when using password storage tools (see also S 2.22 Escrow of passwords):

The escrow or storage of passwords always requires organisational time and expense. Every time a stored password is changed, it is also necessary to update the password in the password storage tool. You must never forget to update the password in the password storage tool.

Before a password storage tool is used, the protection requirements of the passwords to be stored by the tool must be assessed. Not all password tools are suitable for storing passwords with high protection requirements. However, password tools also help the user to select a different password for each application while ensuring each password is as complex as possible.

If a tool will be used to store passwords, then the requirements described in the following for such tools must be considered.

In addition, the following general conditions must be considered, among other conditions, when using tools to store passwords:

All employees in the organisation should be informed whether or not they are allowed to use password storage tools. If such tools are allowed, then the users must be informed which tools have been approved for use. There should also be a rule that describes which types of passwords should be stored using the tool and which general requirements need to be met in this case.

Review questions: