I have an #infosec question: is there any good reason for co-workers to share login information, e.g. to access a supplier website? If yes, what’s the reasonable way to share such information nowadays?

My current customer is doing this, and I’m freaking out a bit. :-/

@fabi1cazenave the only good answer is "NO WAY !"

@AnhkaaDNeige
That’s what I’ve told them, but that’s what they’ve been doing for years… with all logins and passwords saved in plain text on a NAS in their local SMB network…

At the very minimum, I’m looking for an open-source password vault I could setup for them somewhere, but I agree it doesn’t feel like a solution to me. 😠

@fabi1cazenave Depending on the usefulness of the login/password, it could be at least a security breach or a means of identity theft.
For tooling I think there was vault hashicorp for a centralized solution but I'm not sure it's still open

@fabi1cazenave @AnhkaaDNeige keepass or keepassXC could provide what you need. The keepass file could live on their NAS, but that’d require a shared password.

Only a marginal improvement, but at least it wouldn’t be plaintext.

@mathaetaes @fabi1cazenave @AnhkaaDNeige
VaultWarden has "organizations" and "policies" (BitWarden too, but some of it is for "premium" customers only).
@fabi1cazenave ça dépend de la nature du compte AMHA
@fabi1cazenave we use something like VaultWarden. Self hosted is an option.
@fabi1cazenave yeah, obviously there is. It's typically a customer account, and the customer here is a company (or procurement dept., you get the idea), not an individual human. Nothing they can control, so relax and help make secure decisions on where to store credentials and how to, when necessary, update them coordinatedly.(i.e., maybe not a "all our passwords" excel doc on a company-wide accessible share)
@funkylab Yes, that’s what I was thinking of when mentioning a “reasonable way” to do it.
I’m seeing stuff like #Passbolt, does that seem solid? Are there well-trusted alternatives?

@fabi1cazenave not familiar with passbolt. But my experience very much is that non-techie staff, and those are who you serve, will not like having *more* tools to use. (and IT doesn't love it, either).

Since encrypting something locally that gets share makes not much sense, I'll be quite honest: train teams how to set up team-exclusive resources on systems they already use (be it sharepoint, Office365, Google Drive (which sucks big time for this), windows shares), and have them manage these.

@fabi1cazenave rationale: you bring in a central fancy silicon valley-style secrets management system. People use that once, and because it requires separate re-auth, clicking through five layers to find the credentials they need, and then ctrl-c/ctrl-v, they store the credentials in a word doc in their team folder or desktop anyways.

Educate them on security failure models ("let's say the chance that every single one of you doesn't fall prey to spearfishing within 2 years is 97%. The chance…

@fabi1cazenave … that then NONE of you 200 employees fall prey to spearfishing is 0.02% (pretty graph of 0.97^N, for N=1…200). I hope you understand why I encourage you to share passwords only if absolutely necessary and only with the people that REALLY really need them, and not even temporarily on a whim!"), and give them the feeling that they can actually contribute to the prolongued existence of their org.
Make it management's job (not yours personally) to collect these shared accounts, and …

@fabi1cazenave reevaluate whether they really need to be shared (or whether for example multiple people on the procurement team can actually get their own accounts for the same company account). Establish "secure practices" as a business objective (otherwise, management metrics say you should work fast, not secure)

Give them the feeling that you give them improvements (! actually more important than to have perfect solutions) to their workflow.
Be the kind of person that people want to email.

@funkylab Thanks for your detailed and meaningful reply.

I’ve been working with this team for almost 30 years, they’re almost family, and by far the safest work environment I’ve ever experienced, so yes, I totally want to keep it positive. 🙂

We’ve already improved their password policy a lot over time (using strong, unique, auto-generated passwords for every site), but I freaked out a bit this morning when I saw their plaintext file with all logins on an SMB drive. Trying to fix that.

@fabi1cazenave @funkylab sounds like an all hands meeting needed...

How liable are they if this goes tits up? Will customers be hurt?

@fabi1cazenave @funkylab we use 1Password for that use case. Passwords are organized in different folders and only shared on a need to know basis inside out organization. You have your own private vault as well. Everyone uses auto generated passwords and the UI is frictionless. Privately I use keepassXC, but sync between my laptop and phone via syncthing sometimes has hiccups. Edit: and it officially supports Linux with a native app: https://blog.1password.com/welcoming-linux-to-the-1password-family/
Welcoming Linux to the 1Password Family | 1Password

The wait is over. 1Password for Linux is officially here.

1Password Blog
@fabi1cazenave @funkylab yes, using passbolt here and it does it job correctly.
If you are serious about security, this is like PGP, encryption is end to end. Might be too much for some teams 😅

@fabi1cazenave Parfois t'as pas trop lechoix, t'as un compte "entreprise" pour accéder à un truc, pas un compte par personne ...

Un gestionnaire de MDP auto hébergé ça serait la meilleure option face à ce type de problème.

Passbolt fonctionne bien pour moi (et open source), mais il y a sans doute d'autres choix possibles

@Maoulkavien Oui, je suis tombé sur Passbolt après une petite recherche et je pensais leur créer un truc via OVH pour ça et d’autres outils collaboratifs, pour que leurs documents sensibles ne soient pas en clair sur un réseau SMB.
Bon bah on va faire ça. Merci du retour !
@fabi1cazenave Si tu veux j'ai un bout de playbook ansible pour déployer du Passbolt sur un VPS ... Leur playbook officiel ne me plaisait pas pour je ne sais plus quelle raison (utilisation de docker ? Ou que ça écrasait toute conf nginx existante peut être ? )
@fabi1cazenave keepassxc with a shared db.
Text file pgp encrypted
@usul Thanks for the suggestion. That was my first idea, sharing the db on their NAS, but I was afraid it would be too weak.
@fabi1cazenave db was shared in a private git repo to deal with password changes
@fabi1cazenave it's always too weak anyway. The other way is a physical safe but not nice for remote workers

@fabi1cazenave My terrible answer is sometimes it's hard to get to the best solution. There's all sorts of weird cost optimizations! We'll charge you per login. Or the login belongs to John who worked here 10 years ago for 4 weeks and we don't know how to get new ones.

Making it less bad with a password manager is probably the best way to go. Shared to a "team" of sorts. Preferably it should be able to generate strong passwords. So you can rotate as you onboard.

@nigelbabu Thanks for sharing your insight. I’m gonna propose them a password vault.
@fabi1cazenave only for "application" account and through a password manager.

@fabi1cazenave
Depands: is the login information something like a mTLS certificate. Than definitely yes. (Preferably you would still want to use individual credentials, but sharing such a secret is less of an issue).

Is the login information something like a user name and password, preferably not. But not everyone has their stuff in order where they can support multiple users per account. It should still always be available exclusively through a password manager.

And the same goes for 2FA codes, if they need to be shared it should be stored in a password manager.

This is much more about how to deal with the day to day world of imperfect security practices… and less with “is this smart / ok?”.

You must consider that sharing credentials like this does mean that whenever the set of people with access changes (specifically a removal) requires a credential reset. Or you haven’t removed access at all.

@sysosmaster Makes sense. Thanks for sharing.
@fabi1cazenave One thing I want to add: sometimes it is unavoidable to share an account, but then make sure it is mapped to a role email address/distribution list, and not an individual's.

@fabi1cazenave In practice, all the suppliers we work with do not allow to create multiple accounts linked to the same customer account. We also had a lot of trouble to link multiple users to meta account for our library, so we share only one account. The moves in the team and the account creations for all those services/apps can't always be managed automatically. In the end, it's a lot of bad reasons..

Anyway, I explained how to use keypass for those shared accounts in my team, being not able to setup a bitwarden or something more elaborate.

@anxest Good to know. So we’re definitely going to set up a shared password manager.

@fabi1cazenave at Autonomic we generally recommend our hosted Vaultwarden for teams. It's the self hostable version of Bitwarden.

Usually the reason to share is the price serviced charge per user.

@fabi1cazenave Imho the most reasonable way is to use a shared password manager and enforcing 2FA for the password manager. So everyone has their own login for the pw manager and can then use the shared login information.

@fabi1cazenave an example

With my spouse, we share login information with a shared vault in 1Password

Sometimes so I can help debug technical problems (hello Kajabi), other times to save paying for a second subscription, with an app we use personally.

@fabi1cazenave
IMHO there is one, sadly

If the website in question doesn't support multiple users (with the same permissions/access) 😠

A corollary reason could be if you have to pay for each user

@realn2s it’s not a matter of paid service, but yes there could be a practical reason behind that.

Following the general advice I got here, I’m aiming at progressive improvement: I won’t question their workflow, I’m just gonna set up a shared password vault. Or maybe create #CryptPad accounts for all team members?

@realn2s @fabi1cazenave
yeah $/seat is another reason. Not a *good* reason, mind you but a reason.

99% sure that's breaking the terms of service or EULA or whatever, but hey what's a lil digital piracy nowadays?

@fabi1cazenave
Good reason? Probably not

*A* Reason? Perhaps the vendor is just behind the times and there's nothing that can be easily done.

Reasonable way to store and share passwords?
LastPass, Bitwarden, 1Password etc.

1Pass is very enterprise friendly, and Bitwarden is open source / auditable code. You can see everything is encrypted before data is stored on the cloud, or run it yourself.

@fabi1cazenave a password manager with the possibility to share it with a team. Password can be rotated anytime, (assuming people log in using the browser extension).
We use Keeper, which is okay.