The Security Behind Sticky Password

Similar documents
Reviewer Guide Core Functionality

Dashlane Security Whitepaper

FileCloud Security FAQ

Mobile Admin Security

Ensuring the security of your mobile business intelligence

Security Architecture Whitepaper

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sync Security and Privacy Brief

Ensuring the security of your mobile business intelligence

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Our Key Security Features Are:

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

White Paper. The risks of authenticating with digital certificates exposed

Complying with PCI Data Security

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Licensing Guide BES12. Version 12.1

Salesforce1 Mobile Security Guide

Resco Mobile CRM Security

Security Overview Enterprise-Class Secure Mobile File Sharing

Enhanced Security for Online Banking

LBSEC.

SENSE Security overview 2014

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

SharePlus Enterprise: Security White Paper

RSA SecurID Software Token 1.0 for Android Administrator s Guide

Research Information Security Guideline

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

A brief on Two-Factor Authentication

SECURING MOBILE APPLICATIONS

TOP SECRETS OF CLOUD SECURITY

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Chapter 17. Transport-Level Security

Manual for Android 1.5

WHITE PAPER Usher Mobile Identity Platform

AkrutoSync 4.0 User Guide

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Crypho Security Whitepaper

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

When enterprise mobility strategies are discussed, security is usually one of the first topics

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Media Shuttle s Defense-in- Depth Security Strategy

Dell OpenManage Mobile Version 1.4 User s Guide (Android)

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

A Guide For Reviewers. A Guide For Reviewers

Analyzing the Security Schemes of Various Cloud Storage Services

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

365 Cloud Storage. Security Brief

MIGRATIONWIZ SECURITY OVERVIEW

SAS Agent for Outlook Web Access

Mac OS X User Manual Version 2.0

1. Scope of Service. 1.1 About Boxcryptor Classic

USER MANUAL. v Windows Client January

Criteria for web application security check. Version

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

CTERA Agent for Mac OS-X

YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH

Overview. Timeline Cloud Features and Technology

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Configuration Guide. BES12 Cloud

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

2X SecureRemoteDesktop. Version 1.1

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

NCSU SSO. Case Study

CAPITAL UNIVERSITY PASSWORD POLICY

The increasing popularity of mobile devices is rapidly changing how and where we

Famly ApS: Overview of Security Processes

Ciphermail Gateway PDF Encryption Setup Guide

Digital Signatures on iqmis User Access Request Form

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Interwise Connect. Working with Reverse Proxy Version 7.x

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

White Paper. Data Security. journeyapps.com

Feature List for Kaspersky Password Manager

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

ipad in Business Security

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

IBM Security Access Manager for Enterprise Single Sign-On Version User Guide IBM SC

White Paper. BD Assurity Linc Software Security. Overview

Web Security Considerations

Kaspersky Security for Mobile Administrator's Guide

RFG Secure FTP. Web Interface

Portal User Guide. Customers. Version 1.1. May of 5

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Live Guide System Architecture and Security TECHNICAL ARTICLE

Healthcare Compliance Solutions

Enterprise SSO Manager (E-SSO-M)

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Two Factor Zero Knowledge Proof Authentication System

Improving Online Security with Strong, Personalized User Authentication

How To Get To A Cloud Storage And Byod System

Transcription:

The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and personal information are often cited as major reasons not to make use of such security products. Sticky Password utilizes the latest in security and encryption technology to provide users with secure cloud (Amazon server) and local (device only) options for storing their password and other sensitive personal data. This document describes the security of the Sticky Password architecture, so that you can better understand how the software keeps your data secure. We have also included recommendations on how to use our product to achieve the highest possible protection for your data.

System Architecture The Sticky Password system architecture follows the standard client/server model, shown in the illustration below: Fully encrypted data Internal channel Internal channel StickyAccount server Sticky Password Cloud Backend system (SPCB) Sticky Password Cloud Storage service HTTPS protocol HTTPS protocol Data can be decrypted only using User Master Password Desktop Mobile Figure 1: Sticky Password system architecture The Sticky Password client is a client-side application that runs on various operating systems (the latest list is available on our website). The Sticky Password applications (installed on Windows, Mac OS, ios, Android) share the same secure and reliable architecture, regardless of the platform on which they are running. As such, all Sticky Password applications are based on identical security principles and use the same strong cryptographic methodologies. The mobile platform (ios and Android) applications, and the Windows and OS X versions utilize the same secure database architecture, encryption algorithms, and secure cloud synchronization services. Each Sticky Password license (subscription) can be applied to any number of supported physical devices belonging to a single user (NOTE: a user s database is accessible on all of his/her authorized devices). Synchroni-

zation of databases between devices covered by a single license is managed by the Sticky Password Cloud service; alternatively, locally via the local sync option. The Sticky Password Cloud, the server side of the Sticky Password client/server configuration, is comprised of several functional blocks: A discrete protected storage space for synchronized data A back-end system that controls all synchronization operations A StickyAccount to enable secure usage of the client-side application Note: that all password management functionality is accessible only through the client-side application. The storage space and back-end system reside on secure Amazon AWS services (Amazon S3 and Amazon EC2). All stored data is also backed up to the user s local devices covered by the license. Local synchronization The latest version of Sticky Password introduces secure local synchronization of the encrypted database. Desktop Tablet Figure 2: Local sync using Sticky Password This option utilizes the user s Wi-Fi or local network thereby ensuring that the transferred data (i.e. the encrypted database on each device) is always under the control of the user! Local sync occurs between two devices at a time. In effect, the encrypted database from each of the selected devices is passed to the other device over the local network, where it is then synchronized with the resident database.

Whether you choose the local sync or cloud sync option, whenever transmitting database information, Sticky Password works exclusively with the encrypted databases of the devices involved never with unprotected data. Synchronization occurs locally at the device level. Data Protection Data protection in Sticky Password is based on several critical components, all of which are governed by the Master Password. 1. The Master Password a. The Master Password is defined by each user and is used to generate a unique encryption key that is used to encrypt and decrypt the password database that stores the user s data. The encryption and decryption process is performed locally in the application only, never on the server side. The Master Password itself is not stored anywhere, either locally or in the cloud, nor is it transmitted over the Internet under any circumstances. For this reason, no-one, including Sticky Password staff, infrastructure administrators, or anyone other than the user has access to the Master Password. For this reason, users must take great care to ensure that their Master Password is not lost or forgotten as, without it, they will not be able to access their protected data. b. The industry standard AES-256 encryption algorithm is used for encrypting/decrypting user data. An encryption key is derived from the Master Password using the password-based key derivation function PBKDF2, which applies a pseudorandom one-directional function cryptographic hash to the unique Master Password together with a cryptographic salt (random data). The hash-function is applied with several thousands of iterations to further protect against attack. This approach prevents any unauthorized access or retrieval of the Master Password. 2. User account credentials The user s account credentials are required for authorization (i.e. addition) of any new device or browser to the user s license, in order to allow authenticated access to Sticky Password synchronization services, and also to login to the StickyAccount. The user s account credentials consist of the user s StickyID (user-supplied email address) and a Sticky Password access token. The unique token is generated by the Sticky Password application during initialization when creating a new account. A user s secret token is created in the background as the user completes the First Run Wizard, as such, users themselves do not interact with the token. The access token is utilized by all devices connected to the user account (authorized devices). The StickyID and Sticky Password access token are securely saved locally in the operating system. The Sticky Password application gains access to this token via the Master Password (the same principle as in paragraph b.). All operations using the Sticky Password access token are performed locally (by the Sticky Password application or by Javascript in the browser) in the background with no user intervention required. This approach supports a critical security practice the Master Password is not transmitted over the Internet. The Device ID is a unique number generated by each device running the client-side Sticky Password application and is stored on the server. It is used to identify each user device when accessing the synchronization services.

A one-time unique temporary token is allocated to each authorized device to permit synchronization services for a limited time. If expired, the device has to ask the SPCB server for a new one. Summary all a user needs to know and remember is his or her: StickyID (the email address that is the unique identifier of the user) and the Master Password (the password used to secure all of the user s passwords, control access to synchronization services, as well as to the user s Sticky Account. If the Master Password is forgotten, it will not be possible to access the data within the database. Since the Master Password is NOT stored anywhere within Sticky Password app or servers, it is not possible to retrieve a forgotten Master Password. Device Authorization Authorization is a one-time operation: authorized devices are added to the white list table of so-called Trusted devices on the server side and allowed to perform synchronization operations whenever necessary. First device is authorized automatically after the users create their StickyAccount during the installation process of the Sticky Password application. Additional devices must be individually authorized to participate in the synchronization process based on the selected authorization mode. Three authorization modes are available: Basic authorization requires proper authentication using the StickyID and the Master Password (both entered by the user). The encryption key derived from the Master Password is used for retrieving the Sticky Password access token which is required for device authorization. All operations with the Master Password are performed locally on the device. Extended authorization utilizes two-factor authentication using a one-time PIN (the second factor) sent to the user s StickyID email address, in addition to the basic authorization requirements. For security reasons, the PIN must be entered on the target device within 20 minutes. Authorization of new devices is administratively disabled this is the most secure option and is recommended once a user has authorized all of the desired devices. Once successfully authorized, devices use the Sticky Password synchronization services based on the User s account credentials and settings. All processes run in the background and do not require any user intervention. The device authorization modes can be set in the StickyAccount, where the user can also manage the user profile and other product security settings. In their StickyAccount, users are able to access a list of their authorized devices, disable (de-authorize) any or all devices in case of loss or theft of a device, view a history of device activity, delete all user data from cloud storage, and change access

credentials as well as the registered e-mail address. In the same way, access to the StickyAccount portal requires the same authorization process for each browser as for the authorization of new devices. Communication and back-end security Any data transmission channels over the Internet (between the physical device, the browser, and the server side) are secured by HTTPS using protocol TLS 1.1 and above, 256 bit encryption. Server side transmissions are verified by High Assurance SSL GeoTrust certificates. Besides the encrypted communication channel, all protected user data sent via the Internet and stored on Sticky Password servers is in encrypted form, in this way protected data is doubly encrypted when being sent via the Internet. The Sticky Password server side is hosted on the Amazon AWS Infrastructure-as-a-Service (IAAS) platform. All measures taken by Amazon for both physical and platform security are described in the Amazon document Overview of security processes. The back-end system runs on the secure Amazon EC2/Virtual Private Cloud platform. In addition to the Amazon AWS physical and platform security, we have added our own application security layer, consisting of separate internal functional blocks protected by robust firewalls, internal communication channels secured by SSL, and other measures. The Sticky Password server side uses high-availability architecture and avoids any single point of failure. In the unlikely event that there is a synchronization service outage, users can still access all protected data on their local devices; however, deploying newly entered data/accounts/passwords to other synchronized devices will not be possible for the duration of the outage. Recommended Sticky Password Best Practices The Master Password is the sole key to all protected user data. If lost or forgotten, users will be unable to access their database and all data will be lost. It should therefore be memorable for the user, but as hard as possible to guess by others, and also should not be stored anywhere. Here are some hints and tips on developing a complex password that is easily remembered but not easy for others to guess: Do: Mix numbers, upper and lower case letters, and symbols. Make it convenient enough to type quickly to prevent others from seeing what you typed. Create it from a method that makes it easy to remember. Consider choosing a line from a favorite song or poem and using the first letter of each word in that line to generate the password. For example, r-e-s-p-e-c-t, Find Out what it means to me can be transformed into rfowim2m=. Add numbers or symbols to this to make it even harder to guess. Use two unrelated words and separate them with a punctuation mark, symbol or numbers; you could also reverse one or both of the words. For example surf dent would become frus10*tned.

Don t: Use your StickyID in any form (reversed, capitalized, and certainly not as-is) Use your first, middle or last name, or your pet s, parent s, sweetheart s, or child s name Use a common dictionary word To prevent others from adding devices to your list of authorized devices, make sure you set the authorization mode in your StickyAccount Settings tab to One-time PIN and, after successfully authorizing your own devices, set the mode to No new devices. When replacing or upgrading a device covered by a Sticky Password license, it is recommended to remove the old device from the list of authorized (Trusted) devices so that it can no longer be used to access the StickyAccount. Users are encouraged to check their list of Trusted devices periodically for any unauthorized or unused devices and to take the following actions immediately, if they find anything suspicious: 1. Disable the unknown/unused device(s) in the Sticky Portal to exclude it from the synchronization process 2. Change the Master Password in the application GUI on any authorized device 3. Perform manual synchronization on all other devices to encrypt the password database with the new Master Password Summary As you can see, we have taken a great deal of care to ensure that your Sticky Password database is as secure in the cloud as it is on your local devices. If you have any additional questions or concerns about the information provided in this document, please contact us at support@stickypassword.com. About Sticky Password Sticky Password, founded in 2001, is a software utility that creates and organizes passwords to simplify a user s online life without compromising security. Sticky Password provides automatic login, one-click form filling, storage for personal data, and basic collaboration functionality for small groups. It brings set and forget password management technology to the world. Security leaders like Kaspersky Lab, among others, have selected Sticky Password to power elements of their own product solutions. Sticky Password is available at stickypassword.com and at major US retailers including Office Depot, Office Max, Sam s Club, Fry s, MicroCenter and Amazon.