-
Notifications
You must be signed in to change notification settings - Fork 64
Add password manager endpoint hardening guide #419
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
mattaereal
merged 23 commits into
security-alliance:develop
from
DicksonWu654:codex/issue-392-password-manager-endpoint
Apr 6, 2026
Merged
Changes from 7 commits
Commits
Show all changes
23 commits
Select commit
Hold shift + click to select a range
732325b
Add password manager endpoint hardening guide
DicksonWu654 4ae2d5e
Tone down password manager hardening guide
DicksonWu654 285525d
Shorten password manager hardening guide
DicksonWu654 56a18f7
Make wallet secret storage guidance explicit
DicksonWu654 e3113fd
Remove decorative separators from password manager hardening guide
DicksonWu654 592fd23
Fix lint in password manager endpoint guide
DicksonWu654 2b3b690
Tighten password manager endpoint guide
DicksonWu654 d49b609
Shorten password manager endpoint guide
DicksonWu654 38139f3
Clarify password manager endpoint guidance
DicksonWu654 07f8c4e
Add password manager endpoint hardening guide
DicksonWu654 e7076dc
Tone down password manager hardening guide
DicksonWu654 ee809fa
Shorten password manager hardening guide
DicksonWu654 3741a65
Make wallet secret storage guidance explicit
DicksonWu654 03395c4
Remove decorative separators from password manager hardening guide
DicksonWu654 0bae58f
Fix lint in password manager endpoint guide
DicksonWu654 e885e8a
Tighten password manager endpoint guide
DicksonWu654 bbb15b3
Shorten password manager endpoint guide
DicksonWu654 c9a8adb
Clarify password manager endpoint guidance
DicksonWu654 0b595a5
Merge reviewed password manager hardening updates
DicksonWu654 4bf04d6
Expand password manager hardening scope
DicksonWu654 cd4f3dd
Revert "Expand password manager hardening scope"
DicksonWu654 1967545
docs: tighten password manager browser guidance
DicksonWu654 4dcac11
Merge branch 'develop' into codex/issue-392-password-manager-endpoint
mattaereal File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
180 changes: 180 additions & 0 deletions
180
docs/pages/guides/endpoint-security/password-manager-endpoint-hardening.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,180 @@ | ||
| --- | ||
| title: "Password Manager Endpoint Hardening | Security Alliance" | ||
| description: "Harden the devices and browsers that can unlock your password manager: encryption, screen lock, phishing-resistant MFA, safer autofill, clipboard hygiene, recovery planning, and lost-device response." | ||
|
DicksonWu654 marked this conversation as resolved.
Outdated
|
||
| tags: | ||
| - Security Specialist | ||
| - Operations & Strategy | ||
| - Engineer/Developer | ||
| contributors: | ||
| - role: wrote | ||
| users: [dickson] | ||
| --- | ||
|
|
||
| import { TagList, AttributionList, TagProvider, TagFilter, ContributeFooter } from '../../../../components' | ||
|
|
||
| <TagProvider> | ||
| <TagFilter /> | ||
|
|
||
| # Password Manager Endpoint Hardening | ||
|
|
||
| <TagList tags={frontmatter.tags} /> | ||
| <AttributionList contributors={frontmatter.contributors} /> | ||
|
|
||
| ## Summary | ||
|
|
||
| > 🔑 **Key Takeaway:** Encrypt every device that can unlock your vault, lock it quickly, keep it updated, use | ||
| > phishing-resistant MFA on the password manager account, minimize browser and clipboard exposure, and rehearse | ||
| > recovery before an incident. | ||
|
|
||
| A stolen laptop, an over-permissioned browser, or an unlocked device is a more likely path to credential exposure than | ||
| a direct vault attack. This guide covers controls that reduce that endpoint risk. | ||
|
|
||
| ## Why Endpoints Matter | ||
|
|
||
| An unlocked vault gives the endpoint broad credential access. Hardening reduces common failure modes: | ||
|
|
||
| - lost or stolen devices exposing vault access | ||
| - browser sessions interacting with malicious sites | ||
| - clipboard leakage across apps or devices | ||
| - weak recovery flows becoming the easiest way around strong login protections | ||
|
|
||
| If you suspect the endpoint was compromised while the vault was unlocked, follow the | ||
| [lost or stolen device response](#lost-or-stolen-device-response) steps below. | ||
|
|
||
| ## For Individuals | ||
|
|
||
| ### Minimum Device Baseline | ||
|
|
||
| - [ ] Use only supported, regularly updated operating systems and browsers | ||
| - [ ] Enable full-disk encryption on every device that can access the vault | ||
| - [ ] Require a real screen lock with a short idle timeout and password on wake | ||
|
DicksonWu654 marked this conversation as resolved.
Outdated
|
||
| - [ ] Do day-to-day work as a standard user, not a local administrator | ||
| - [ ] Enable device location, remote lock, and remote wipe features before you need them | ||
| - [ ] Keep the password manager set to lock on sleep, device lock, and browser or app exit | ||
| - [ ] Prefer a small number of clean, trusted devices over many semi-trusted ones | ||
|
|
||
| ### Safer Browser and Vault Usage | ||
|
|
||
| - [ ] Use a dedicated browser profile for work or other high-value accounts | ||
| - [ ] Keep that profile minimal: password manager extension plus as few others as possible | ||
|
DicksonWu654 marked this conversation as resolved.
Outdated
|
||
| - [ ] Prefer user-initiated fill over broad automatic fill on page load | ||
| - [ ] Verify the domain before filling credentials for high-impact accounts such as registrars, GitHub, cloud, | ||
| finance, or admin panels | ||
| - [ ] Avoid logging into the work vault from throwaway browsers, borrowed devices, or lightly managed personal systems | ||
| - [ ] On shared or high-risk endpoints, sign out when done instead of relying only on long idle timeouts | ||
|
|
||
| ### Clipboard and Copy/Paste Hygiene | ||
|
|
||
| - [ ] Prefer direct fill into the browser or app instead of copying secrets to the clipboard | ||
| - [ ] Disable clipboard history and cross-device clipboard sync on endpoints used for sensitive workflows | ||
| - [ ] If you must copy a secret, paste it immediately and clear the clipboard or rely on the password manager's | ||
| auto-clear setting if supported | ||
| - [ ] Avoid third-party clipboard managers on devices used for administrative accounts | ||
|
|
||
| ### Protecting the Password Manager Account | ||
|
|
||
| - [ ] Use phishing-resistant MFA such as FIDO2/WebAuthn security keys where supported | ||
| - [ ] For highest-risk operators, prefer hardware security keys over broadly syncable authenticators when possible | ||
| - [ ] Keep at least two recovery-capable authenticators enrolled | ||
| - [ ] Do not rely on SMS as the primary recovery or second-factor method | ||
| - [ ] Store recovery codes or emergency-kit material offline and separately from the device | ||
| - [ ] Avoid circular dependency: do not make the only copy of recovery material depend on access to the same vault | ||
|
|
||
| ### Mobile-Specific Considerations | ||
|
|
||
| - [ ] Use a strong device passcode, not a weak convenience PIN | ||
| - [ ] Keep mobile OS updates enabled and current | ||
| - [ ] Review which phones and tablets are trusted to access the vault and remove unused ones | ||
| - [ ] Prefer not to keep the work vault available on every personal mobile device by default | ||
| - [ ] Respond quickly to a lost phone because it often holds both active sessions and recovery channels | ||
|
|
||
| ## For Admins | ||
|
|
||
| ### Endpoint Policy Baseline | ||
|
|
||
| - [ ] Restrict work-vault access to managed, encrypted, up-to-date devices wherever feasible | ||
| - [ ] Enforce screen-lock, password-on-wake, and patching baselines through MDM or equivalent controls | ||
| - [ ] Require standard-user day-to-day operation on managed endpoints | ||
| - [ ] Ensure remote lock and wipe are available for every device allowed to access the work vault | ||
| - [ ] Escrow disk-encryption recovery material through approved administrative processes | ||
|
|
||
| ### Browser and Session Controls | ||
|
|
||
| - [ ] Use managed browser profiles for administrative workflows | ||
| - [ ] Restrict extensions with allowlists or equivalent enterprise policy controls | ||
| - [ ] Keep privileged profiles separate from general browsing, email, and social use | ||
| - [ ] Configure short lock timeouts for password-manager sessions where vendor policy supports it | ||
| - [ ] Periodically review trusted devices, active sessions, and shared-vault membership | ||
|
|
||
| ### Team and Recovery Operations | ||
|
|
||
| - [ ] Define who owns break-glass recovery and how it is approved, accessed, and rotated after use | ||
| - [ ] Keep role-based access tight for shared or business vaults | ||
| - [ ] Remove departing staff from vault access, trusted devices, and recovery paths during offboarding | ||
| - [ ] Document when downstream credential rotation is mandatory after suspected endpoint compromise | ||
|
|
||
| ## Web3-Specific Operational Rules | ||
|
|
||
| Password managers in Web3 guard registrar, source control, cloud, and finance credentials. Endpoint controls should | ||
| match that sensitivity. | ||
|
|
||
| ### High-Impact Accounts | ||
|
|
||
| Prioritize hardening and incident response for endpoints that access: | ||
|
|
||
| - registrars, DNS, and email administration | ||
| - GitHub, package publishing, and CI/CD platforms | ||
| - cloud providers, secret stores, and infrastructure consoles | ||
| - communication platforms used for incident response or announcements | ||
| - finance, banking, custody, payroll, and vendor-admin portals | ||
|
|
||
| ### Practical Rules | ||
|
|
||
| - Use a separate browser profile, and ideally a separate device, for the highest-risk admin workflows | ||
| - Do not mix privileged vault use with casual browsing, random extensions, or high-risk social-media browsing in the | ||
| same session | ||
| - Keep personal and work vault access separated where possible to reduce accidental exposure and simplify incident | ||
| response | ||
| - Prefer hardware security keys for the password manager account and highest-impact downstream services | ||
| - Never store wallet seed phrases, private keys, or recovery phrases in a password manager, secret manager, browser | ||
| storage, notes app, or any similar system | ||
| - If an endpoint used for registrar, GitHub, cloud, or finance access looks compromised, rotate those credentials first | ||
|
|
||
| ## Lost or Stolen Device Response | ||
|
|
||
| Use this runbook if a device with possible vault access is lost, stolen, or suspected compromised: | ||
|
DicksonWu654 marked this conversation as resolved.
Outdated
|
||
|
|
||
| 1. Lock, mark lost, or wipe the device as quickly as possible. | ||
| 2. Revoke the device or active sessions from the password manager or identity provider if the product supports it. | ||
| 3. Change the password manager account password and review enrolled MFA methods. | ||
| 4. Rotate downstream credentials in priority order: | ||
| - registrar and DNS | ||
| - primary email | ||
| - GitHub and package publishing | ||
| - cloud and deployment platforms | ||
| - finance and vendor-admin portals | ||
| 5. Review recent account activity for signs of unauthorized access. | ||
| 6. Replace recovery material and backup authenticators if their custody is uncertain. | ||
|
|
||
| If you cannot confirm the vault was locked at the time of loss, treat exposed credentials as the default assumption and | ||
| rotate accordingly. | ||
|
|
||
| ## Related Guides | ||
|
|
||
| - [GitHub Security](/guides/account-management/github) | ||
| - [GoDaddy Security](/guides/account-management/godaddy) | ||
| - [Registrar Security & Registry Locks](/infrastructure/domain-and-dns-security/registrar-and-locks) | ||
| - [Understanding Threat Vectors](/awareness/understanding-threat-vectors) | ||
|
|
||
| ## Further Reading | ||
|
|
||
| - [NIST SP 800-63 Digital Identity Guidelines](https://pages.nist.gov/800-63-4/) | ||
| - [W3C WebAuthn](https://www.w3.org/TR/webauthn-3/) | ||
| - [CISA: Implementing Phishing-Resistant MFA](https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a) | ||
| - [NCSC: Password Managers](https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/password-managers) | ||
| - [Apple: Protect Data on Your Mac with FileVault](https://support.apple.com/guide/mac-help/protect-data-on-your-mac-with-filevault-mh11785/mac) | ||
| - [Microsoft: BitLocker Overview](https://support.microsoft.com/en-us/windows/bitlocker-overview-44c0c61c-989d-4a69-8822-b95cd49b1bbf) | ||
| - [Android: Find, Secure, or Erase a Lost Device](https://support.google.com/android/answer/6160491) | ||
|
|
||
| </TagProvider> | ||
| <ContributeFooter /> | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -332,4 +332,5 @@ SSDF | |
| SLSA | ||
| pids | ||
| Kata | ||
| rootfs | ||
| rootfs | ||
| NCSC | ||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.