Procedure / process to manage password envelop / pouch

Posted on 2014-01-22
Last Modified: 2014-02-06
to safeguard accounts & passwords for use in the event of an emergency,
server passwords are stored in a folded and stapled sheet of paper called
a password pouch.  

Can anyone share some of the procedures for administering the password pouches?
Question by:sunhux
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 27

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 100 total points
ID: 39802026
Use password box instead.  All the passwords can be stored there and then have them assigned through the legacy Locker section.
LVL 63

Accepted Solution

btan earned 310 total points
ID: 39802094
Some also state pouch as password wallet. Eventually it is a file itself so as a whole it should be able to maintain

a) confidentiality - also stay encrypted when at rest even if it reside in shared drive. Ensure temp files are not left behind with secure wipe.

b) Access control- Allow only authorised amd authenticated user access upon success verification.

c) Integrity - signature maintain in all version changes such that it is validated no tampering and audit log available to vouch chnages on who and when and what changes as applicable. Tampered or corrupted wallet should alert and escalate to admin promptly.

d) availability - ensure that it is make accessible via the valid software and machine designated to host the wallet. There should be  alert if wallet is missing reported such that it can be removed or replaced. Lilely abused as well even by privileged admin..hence ensure no shared accounts if possible. Self reset should be validates by user and not via helpdesk only.

In general, the hosted machine should be hardened and should restrict to the machine so that it is not exportable unless for machine changes authorised due to circumstances like hw changes etc.

The recovery process should be make available such that user will not be denied access for long period.  There are single sign on but I leave it out. ..

also some reference which may be useful

Password Management Best Practices @

...some password management guidelines to follow: Hitachi ID Systems Best Practices
Very insecure systems, such as those that use little or no cryptography to protect passwords, should not participate in a password synchronization system.

Synchronized passwords should be changed regularly, on the assumption that either some in-scope systems are vulnerable or that passwords may be compromised through non-digital means (social engineering, etc.).

Users should be required to select strong (hard to guess) passwords when synchronization is introduced.

Guide to Enterprise Password  Management (NIST Special Publication 800-118) @

The following items are general recommendations for using password management software:
Set the software’s timeout feature so that access to the passwords will be automatically locked after an idle period, such as five minutes.
Clear the buffer after the password is copied and pasted (many password management software programs do this automatically).
Back up the password database periodically, especially after a password is changed. If the computer’s copy of the password database becomes corrupted or something adverse happens to the computer, the user can get the passwords from the backup copy of the password database.
Use a strong master password that is not easily guessable or crackable, or an alternate form of authentication that is stronger than a password.
Password management software should protect the confidentiality of stored passwords using FIPS-approved algorithms and implementations

Assisted Solution

jfer0x01 earned 90 total points
ID: 39816904
Password pouch? Seem's old school and subject to simple theft, water damage, etc.

Maybe it's time to use a Software based password manager. Try Keepass/

One very long passphrase to store all the passwords you would normally keep in the pouch, and free.

Hope this helps.

LVL 63

Assisted Solution

btan earned 310 total points
ID: 39817089
keepass is not bad either, a good list is available here too.

lastpass is another -

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

OnPage: Incident management and secure messaging on your smartphone
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question