{"id":74510,"date":"2023-02-07T10:23:55","date_gmt":"2023-02-07T15:23:55","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=74510"},"modified":"2024-04-22T15:46:56","modified_gmt":"2024-04-22T19:46:56","slug":"jumpcloud-password-manager-secure-approach-password-management","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/jumpcloud-password-manager-secure-approach-password-management","title":{"rendered":"The Path to Secure Password Management"},"content":{"rendered":"\n

For most organizations, user identities \u2014 and more specifically their passwords \u2014 are the gateway into critical business resources. However, billions of passwords exist across work and personal accounts belonging to people all over the world, which means there are billions of attack vectors ready to be exploited by malicious actors.<\/p>\n\n\n\n

\n

Experts estimate that over 8 million<\/a> passwords are stolen every single day.<\/p>\n<\/blockquote>\n\n\n\n

The reason why just the sheer existence of so many passwords creates vulnerabilities is because the passwords employees use at work are often considered insecure, weak, common, or even reused, and so the myriad of techniques malicious actors have at their disposal to steal, generate, and then brute force systems with passwords they\u2019ve acquired could easily grant them legitimate access to various resources. The seeming lack of effort end users put into password security is never malicious; instead, due to a variety of factors such as account sprawl, poor login experiences, and attempts to make day-to-day workflows easier, end users are not always incentivized (or empowered) to take password security seriously.<\/p>\n\n\n\n

On average, most departments use 40-60 tools each<\/a>, and even if a single employee only accesses a third of those, password fatigue<\/a> is an ongoing problem. The average individual has too many accounts to keep track of password best practices for all of them. This can result in reusing the same password they use for personal accounts, to keeping a list of their passwords in a spreadsheet or even written down on sticky notes or shoved into a desk drawer. Whatever the bad practice is, it adds significant risk to your organization, which cannot be ignored.<\/p>\n\n\n\n

\"Easy<\/figure>\n\n\n\n

<\/p><\/div>

Note:<\/strong> \n

On average, employees reuse passwords across 16 accounts.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n

For these reasons, the burden of ensuring password and resource security should not fall on the end user. End users care about accomplishing their work, and they\u2019ll find ways to make their day-to-day lives easier (i.e., getting access to resources and apps quickly and easily) at any cost. For most, password security<\/a> is simply not a priority, especially considering the number of passwords needed to access all of their resources.<\/p>\n\n\n\n

Progress Toward Password and Account Protection<\/h2>\n\n\n\n

Account sprawl is a significant issue for many organizations, but cutting down on applications and tools is a short-term solution at best. That\u2019s why, over time, significant strides have been made to better protect passwords.<\/p>\n\n\n\n

Multi-Factor Authentication<\/h3>\n\n\n\n

One example of this is multi-factor authentication (MFA), which has been widely adopted across both organizational and personal accounts. While MFA greatly enhances security, the continued existence and use of passwords will keep creating security problems for businesses everywhere.<\/p>\n\n\n\n

For example, say an employee\u2019s information gets compromised in a data breach, and a bad actor gains access to their password. While MFA will help protect work resources, that bad actor may also have access to that user\u2019s email and many other accounts, which can allow them to bypass MFA requirements. The password is still a single point of failure in this scenario.<\/p>\n\n\n\n

Passwordless Authentication<\/h3>\n\n\n\n

Another strategy for protecting resources better involves passwordless authentication, a model where users no longer need passwords to gain access to their accounts. Instead, users authenticate with safer (and more convenient) factors such as secure tokens and magic links, delivered via email, text message, or an authenticator app. However, even as passwordless authentication gains traction and organizations switch over to it, passwords will persist for a long time, which means they need to be securely managed for the foreseeable future.<\/p>\n\n\n\n

Password Managers<\/h3>\n\n\n\n

Password managers were specifically created to help solve this problem, or at least mitigate its risk wherever possible, by creating a better way for end users to produce unique, complex passwords for each of their accounts. However, the original intent of password managers doesn\u2019t quite match the challenges organizations face today.<\/p>\n\n\n\n

The Creation of Password Managers<\/h2>\n\n\n\n

The original purpose of password managers was twofold:<\/p>\n\n\n\n

    \n
  1. Enhance password security and promote best practices<\/a> among end users.<\/li>\n\n\n\n
  2. Simplify the end user password management and login experience.<\/li>\n<\/ol>\n\n\n\n

    They enhance password security by making it easier for users to create strong, unique passwords without the need for memorization, and they improve the user experience through simplified, digital password management instead of requiring passwords to be manually recorded somewhere insecure (such as a notebook or spreadsheet). This helps prevent password-focused attacks used by hackers to compromise accounts.<\/p>\n\n\n\n

    \"\"<\/figure>\n\n\n\n

    By using a password manager, organizations can also enforce password policies<\/a>, such as requiring frequent password changes or complex passwords, without imposing a burden on their employees (or themselves). In addition, password managers often include features such as two-factor authentication (2FA), which adds an extra layer of security that protects against unauthorized access. Overall, password managers are an important tool for ensuring the security of an organization\u2019s online assets and protecting against cyber threats.<\/p>\n\n\n\n

    And yet, devastating breaches still occur each year, compromising millions of accounts, credentials, and other personal and company information. Why? Because at the end of the day, despite the many advancements in the functionality of password manager technology, most password managers require a master password<\/strong> from the end user to grant access to their vault.<\/p>\n\n\n\n

    The original purpose of password managers was to improve end user password habits, but with the key to the entire password vault being yet another password, the burden of password security still falls largely on the end user.<\/p>\n\n\n\n

    Something needs to change in order to better protect passwords in the workplace, and that next step involves reevaluating the architecture password managers are built upon. Password management architecture<\/a> is just as important as the features and benefits the manager offers (i.e., password generation, autofilling, sharing, etc.) to end users. Over the years, significant innovation has occurred in the realm of password management features, but now it\u2019s time for the next wave of architecture updates to take place.<\/p>\n\n\n\n

    Types of Password Managers<\/h2>\n\n\n\n

    Currently, password management solutions fall into two categories: traditional password management solutions that are cloud-based or purely store passwords offline, and the newer, hybrid password management approach which is, as you might have guessed, a hybrid between cloud-based and offline password managers.<\/p>\n\n\n\n

    Offline Models<\/h3>\n\n\n\n

    The first type of traditional password management solution is referred to as an offline model. Offline password managers are software programs that store login credentials on a user’s local device, rather than in the cloud.<\/p>\n\n\n\n

    How Offline Models Work<\/h4>\n\n\n\n

    They work by creating a secure, encrypted repository on the user’s device, and that repository is accessed using a master password. Users can then add new login credentials to their password manager by providing the website or application name, their username, and the corresponding password. The password manager will then securely store this information locally, encrypting the data contained within the vault until the proper credentials (i.e. the master username and password) are used to decrypt them for consumption.<\/p>\n\n\n\n

    When a user needs to log in to one of their accounts, they can simply go to the website or launch the app and use their password manager to automatically fill in their login credentials. This saves users from having to remember multiple complex passwords, and it helps to prevent password reuse, which is a common attack vector for hackers.<\/p>\n\n\n\n

    Offline password managers offer the advantage of being completely independent of the internet, which can be useful for users who are concerned about their online privacy or security.<\/p>\n\n\n\n

    Limitations of Offline Models<\/h4>\n\n\n\n

    With offline password managers, users will still need to create a master password that they can remember in order to access their vault. Another issue with offline managers is that they store passwords on the user\u2019s device, with no way to sync the vault across multiple devices. Instead, users have to manually copy and paste their vaults on each device they use and then keep them updated manually after that, which is tedious and inefficient.<\/p>\n\n\n\n

    Offline password managers are not suitable for modern, business use cases for a few reasons:<\/p>\n\n\n\n