Procedure / process to manage password envelop / pouch

Posted on 2014-01-22
Last Modified: 2014-02-06
to safeguard accounts & passwords for use in the event of an emergency,
server passwords are stored in a folded and stapled sheet of paper called
a password pouch.  

Can anyone share some of the procedures for administering the password pouches?
Question by:sunhux
  • 2
LVL 27

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 100 total points
ID: 39802026
Use password box instead.  All the passwords can be stored there and then have them assigned through the legacy Locker section.
LVL 62

Accepted Solution

btan earned 310 total points
ID: 39802094
Some also state pouch as password wallet. Eventually it is a file itself so as a whole it should be able to maintain

a) confidentiality - also stay encrypted when at rest even if it reside in shared drive. Ensure temp files are not left behind with secure wipe.

b) Access control- Allow only authorised amd authenticated user access upon success verification.

c) Integrity - signature maintain in all version changes such that it is validated no tampering and audit log available to vouch chnages on who and when and what changes as applicable. Tampered or corrupted wallet should alert and escalate to admin promptly.

d) availability - ensure that it is make accessible via the valid software and machine designated to host the wallet. There should be  alert if wallet is missing reported such that it can be removed or replaced. Lilely abused as well even by privileged admin..hence ensure no shared accounts if possible. Self reset should be validates by user and not via helpdesk only.

In general, the hosted machine should be hardened and should restrict to the machine so that it is not exportable unless for machine changes authorised due to circumstances like hw changes etc.

The recovery process should be make available such that user will not be denied access for long period.  There are single sign on but I leave it out. ..

also some reference which may be useful

Password Management Best Practices @

...some password management guidelines to follow: Hitachi ID Systems Best Practices
Very insecure systems, such as those that use little or no cryptography to protect passwords, should not participate in a password synchronization system.

Synchronized passwords should be changed regularly, on the assumption that either some in-scope systems are vulnerable or that passwords may be compromised through non-digital means (social engineering, etc.).

Users should be required to select strong (hard to guess) passwords when synchronization is introduced.

Guide to Enterprise Password  Management (NIST Special Publication 800-118) @

The following items are general recommendations for using password management software:
Set the software’s timeout feature so that access to the passwords will be automatically locked after an idle period, such as five minutes.
Clear the buffer after the password is copied and pasted (many password management software programs do this automatically).
Back up the password database periodically, especially after a password is changed. If the computer’s copy of the password database becomes corrupted or something adverse happens to the computer, the user can get the passwords from the backup copy of the password database.
Use a strong master password that is not easily guessable or crackable, or an alternate form of authentication that is stronger than a password.
Password management software should protect the confidentiality of stored passwords using FIPS-approved algorithms and implementations

Assisted Solution

jfer0x01 earned 90 total points
ID: 39816904
Password pouch? Seem's old school and subject to simple theft, water damage, etc.

Maybe it's time to use a Software based password manager. Try Keepass/

One very long passphrase to store all the passwords you would normally keep in the pouch, and free.

Hope this helps.

LVL 62

Assisted Solution

btan earned 310 total points
ID: 39817089
keepass is not bad either, a good list is available here too.

lastpass is another -

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With healthcare moving into the digital age with things like, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question