Encryption
Used Algorithms
Safety has always been one of the most basic considerations when designing software. All other requirements were assessed according to how safe they were. Parallel to the development phase, the theoretical concepts of external security companies were examined in terms of feasibility, as well as compliance with IT security standards. Prototypes have been ultimately developed on the basis of these findings, which form the blueprint for the current Netwrix Password Secure version 8. The following encryption techniques and algorithms are currently in use:
- AES-GCM 256
- PBKDF2 with 623,420 SHA256 iterations (client- and server-side) for the creation of user hashes
- PBKDF2 with 610,005 SHA256 iterations for the encryption of the user keys
- ECC (with the "NIST P-521" curve) for the private-public key procedure
NOTE: All encryption algorithms used by Netwrix Password Secure are FIPS compliant.
Applied cryptographic procedures
Applied cryptographic procedures The container encryption of the passwords is based on the aforementioned algorithms. Each container has its own randomly generated salt. Each password, user, and role has its own key pair. When releases are granted for users and roles, the passwords within the database are hierarchically encrypted. Netwrix Password Secure also uses the following cryptographic methods to achieve maximum security:
To integrate an AD, you can choose between an end-to-end encryption (E2EE – the safest mode) and the Master Key The server key is protected using the hardware security module (HSM) via PKCS#11 Brute force protection for logging in by means of automatic blocking of the requesting client Certificate protection when using applications Certificate request for client/server connection You may use your own certificate authority (CA) as an option. Latest version of the Secure Sockets Layer (SSL) Passwords are only encrypted and transported to the client when they have been explicitly requested in advance. More…
CAUTION: Only secrets are encrypted. Metadata is not encrypted to ensure search speed. Secrets are usually passwords. However, the customer can decide what kind of data they are. Note that Secrets cannot be searched for.