Improve company productivity with a Business Account.Sign Up


Procedure / process to manage password envelop / pouch

Posted on 2014-01-22
Medium Priority
Last Modified: 2014-02-06
to safeguard accounts & passwords for use in the event of an emergency,
server passwords are stored in a folded and stapled sheet of paper called
a password pouch.  

Can anyone share some of the procedures for administering the password pouches?
Question by:sunhux
  • 2
LVL 31

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 400 total points
ID: 39802026
Use password box instead.  All the passwords can be stored there and then have them assigned through the legacy Locker section.
LVL 66

Accepted Solution

btan earned 1240 total points
ID: 39802094
Some also state pouch as password wallet. Eventually it is a file itself so as a whole it should be able to maintain

a) confidentiality - also stay encrypted when at rest even if it reside in shared drive. Ensure temp files are not left behind with secure wipe.

b) Access control- Allow only authorised amd authenticated user access upon success verification.

c) Integrity - signature maintain in all version changes such that it is validated no tampering and audit log available to vouch chnages on who and when and what changes as applicable. Tampered or corrupted wallet should alert and escalate to admin promptly.

d) availability - ensure that it is make accessible via the valid software and machine designated to host the wallet. There should be  alert if wallet is missing reported such that it can be removed or replaced. Lilely abused as well even by privileged admin..hence ensure no shared accounts if possible. Self reset should be validates by user and not via helpdesk only.

In general, the hosted machine should be hardened and should restrict to the machine so that it is not exportable unless for machine changes authorised due to circumstances like hw changes etc.

The recovery process should be make available such that user will not be denied access for long period.  There are single sign on but I leave it out. ..

also some reference which may be useful

Password Management Best Practices @

...some password management guidelines to follow: Hitachi ID Systems Best Practices
Very insecure systems, such as those that use little or no cryptography to protect passwords, should not participate in a password synchronization system.

Synchronized passwords should be changed regularly, on the assumption that either some in-scope systems are vulnerable or that passwords may be compromised through non-digital means (social engineering, etc.).

Users should be required to select strong (hard to guess) passwords when synchronization is introduced.

Guide to Enterprise Password  Management (NIST Special Publication 800-118) @

The following items are general recommendations for using password management software:
Set the software’s timeout feature so that access to the passwords will be automatically locked after an idle period, such as five minutes.
Clear the buffer after the password is copied and pasted (many password management software programs do this automatically).
Back up the password database periodically, especially after a password is changed. If the computer’s copy of the password database becomes corrupted or something adverse happens to the computer, the user can get the passwords from the backup copy of the password database.
Use a strong master password that is not easily guessable or crackable, or an alternate form of authentication that is stronger than a password.
Password management software should protect the confidentiality of stored passwords using FIPS-approved algorithms and implementations

Assisted Solution

jfer0x01 earned 360 total points
ID: 39816904
Password pouch? Seem's old school and subject to simple theft, water damage, etc.

Maybe it's time to use a Software based password manager. Try Keepass/

One very long passphrase to store all the passwords you would normally keep in the pouch, and free.

Hope this helps.

LVL 66

Assisted Solution

btan earned 1240 total points
ID: 39817089
keepass is not bad either, a good list is available here too.

lastpass is another -

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

There's never been a better time to become a computer scientist. Employment growth in the field is expected to reach 22% overall by 2020, and if you want to get in on the action, it’s a good idea to think about at least minoring in computer science …
A discussion about Penetration Testing and the Tools used to help achieve this important task.
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

606 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question