Prior Blog Article: LastPass Breach Blog Article and Update 2 (12-24-2022)
During a recent group discussion that CyberHoot participated in relating to the LastPass breach, Bradley Gross made a comparison between parachute manufacturing and password management. Parachute manufacturers have a low-risk tolerance, yet they still produce parachutes. Similarly, password managers are like parachutes that protect your digital identity. Just like in skydiving, where a backup chute, emergency training, and proper folding are essential for success, using a password manager is crucial in protecting one’s identity, which can have devastating consequences.
Using a password manager is essential in today’s connected world. However, in the event of a critical failure like the LastPass breach, it’s crucial to evaluate our criteria for selecting a password management vendor and how we operate the solution. It’s important to examine the implementation of our chosen solution to ensure its proper functioning, and to train for emergency situations since no software is perfect. Choosing the best manufacturer possible is also essential. This blog article outlines CyberHoot’s criteria for selecting a Password Management vendor which you can leverage for your business or your Managed Services Provider (MSP).
CyberHoot has chosen to transition to a new Password Management (PM) platform and has decided to discontinue recommending any specific password manager to others. This decision was made after taking into account the opinions of several cybersecurity experts, including Bruce Sneider, Brad Deflin of TotalDigitalSecurity, and Jeremy Gosney, a Yahoo security researcher, who have also suggested migrating away from LastPass following their recent security breach and inadequate communication about it. However, choosing the right platform and vendor can be challenging. So how do you choose?
CyberHoot has learned a lot about PM solutions during this latest event. We have researched the many challenges facing these vendors. They really are comparable to Parachute manufacturers. Therefore, CyberHoot suggests you follow our criteria for choosing your PM tool:
In looking through the Password Manager reviews performed by ZDNet, Toms Guide, and PC Magazine, we did not find references to the critical criteria of vendors having contracted for independent 3rd party security audits, application security assessments, or penetration testing of their cloud architecture. Following the parachute analogy one last time, would you choose a Parachute manufacturer that said “trust us” we know what we’re doing, or one that was certified to ISO 9000 manufacturing standards annually by multiple 3rd party audits?
Therefore, CyberHoot went looking for vendor references to these software audits and testing reviews on vendor’s websites. Below you will find links to PM vendors 3rd-party reviews, audits, assessments, and testing. Review these carefully as they are all not equal. Many PM vendors made no mention of this line of testing and auditing on their product or architecture.
Let CyberHoot reiterate, given the LastPass challenges, criteria number 1 above needs to be your basic decision point that must be met before proceeding to criteria 2, 3, and 4 in choosing your password manager.
1Password 3rd Party Security Audits
Keeper 3rd Party Security Audits (search for Audits)
Bitwarden 3rd Party Audits and Compliance
MSPs need to provide support for password managers to their clients. When the manufacturer fails, your Master Services Agreement should be in place to protect you from liability. Make sure you have an MSA in place with each of your clients that provide the appropriate protection for a potential “chute failure” by a software manufacturer. Don’t stop ski diving, just make sure you’re prepared for all the eventualities.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.