REPORT – Password Managers – v1.0.0
Eldon Gabriel
Eldon Gabriel

Categories

  • Identity Security

Tags

  • Authentication
  • Credential Security
  • Identity Management
  • Windows

0.0 Executive Summary

This report explains how password management practices were improved on a standalone workstation.

The main goal was to reduce the risk of account compromise and unauthorized access. This was achieved by using structured password management tools and stronger security practices.

The final result improved overall security by removing weak habits such as password reuse and insecure storage. These were replaced with encrypted storage, controlled access, and more secure password handling methods.


1.0 Password Managers

1.1 Project Description

The goal of this task was to improve how passwords are created, stored, and managed.

This was done to protect against attacks that target credentials.

The implementation focused on:

  • Using strong, unique passwords for each account
  • Storing passwords in an encrypted vault
  • Adding Multi-Factor Authentication (MFA) for extra protection
  • Centralizing password management to improve control and visibility

These controls help protect user accounts and systems from attacks such as brute-force attempts and credential stuffing.


1.2 Technical Task / Troubleshooting Process

The process involved reviewing the current password practices and identifying weaknesses. Security controls were then applied using a password management solution.

Key Actions & Observations

  • Reviewed default password behavior and identified risks such as weak or reused passwords
  • Configured encryption standards such as AES-256 for secure storage
  • Enabled Multi-Factor Authentication (MFA) for vault access
  • Applied settings to:
    • Require strong master passwords
    • Prevent storage of passwords in plain text
  • Verified supporting features:
    • Browser integration for autofill
    • Sync between cloud and local vaults
  • Documented setup steps for future use and repeatability

Root Cause:
Default password practices often focus on convenience. This leads to weak or reused passwords and increases the risk of compromise. The issue was resolved by enforcing stronger password rules and using a secure, encrypted password manager with MFA.


1.3 Resolution and Validation

The password management system was configured and tested to confirm it worked correctly.

Parameter Configuration Value
Management Tool Password Manager (Vault)
Control State Enabled
Security Mode Encrypted / MFA Enforced
Scope User and Enterprise Credentials

Validation Steps

  1. Attempted to access a secure service using credentials not stored in the vault

  2. Verified that the password manager generated a strong, unique password

  3. Confirmed that MFA was required before access to the vault

  4. Tested autofill functionality across applications

  5. Verified that password synchronization worked correctly across devices


2.0 CONCLUSION

2.1 Key Takeaways

  • Default password practices are not secure enough for modern threats
  • Using a password manager helps enforce unique and strong passwords
  • Encryption and MFA significantly improve credential protection
  • Testing is needed to confirm that password tools work as expected

2.2 Security Implications and Recommendations

Risk: Credential Stuffing
Attackers can use leaked passwords from one system to try and access other accounts.

Mitigation:
Use unique passwords for every account and store them in a password manager.

Risk: Master Password Compromise
If the master password is weak, all stored credentials are at risk.

Mitigation:
Require strong master passwords and enforce Multi-Factor Authentication (MFA).

Best Practices

  • Limit access to shared vaults using least privilege principles
  • Use centralized password management for consistency
  • Regularly review and update password policies
  • Document configurations for auditing and onboarding purposes

Framework Alignment

  • Supports identity and access management best practices
  • Aligns with NIST controls (PR.AC-1, PR.AC-5)
  • Meets ISO 27001 and PCI DSS guidance for secure credential storage and authentication