Web Analytics

FireOak Strategies Blog

Insights and articles related to knowledge management, information security, technology, data and analytics, business process automation, platform management, and other related topics, from our experienced team of consultants.

FireOak’s Recommended Bitwarden Settings

Bitwarden is a great password management tool Following are FireOak s recommended Bitwarden settings all of which we strongly recommend enabling for enterprise accounts If possible configure these organizational policies and settings before deploying for users
Picture of FireOak Communications Team

FireOak Communications Team

For years, FireOak has been recommending to clients that they implement an enterprise password management platform as part of their cybersecurity strategy. FireOak is not a reseller of any platforms, but increasingly we’ve been recommending Bitwarden for organizations that are in the market for a new enterprise password management platform. Bitwarden is easy to deploy, but it does contain several enterprise-level settings that must be configured and fine-tuned to align with other security policies. Following are FireOak’s recommended Bitwarden settings. All of these settings require admin permissions and can be accessed through Bitwarden’s web interface via “Organizations > Settings > Policies.”

  1. Two-step login (MFA): Required
  2. Master password requirements:
    • Minimum complexity score = Strong (4)
    • Minimum length = 20
  3. Single organization policy: turn on
  4. Account recovery administration: turn on
  5. Remove individual vault export: turn on

Continue reading for more details about each of these recommended Bitwarden settings.

Multi-Factor Authentication

Bitwarden refers to multi-factor authentication (MFA) as “two-step login.” It is imperative that all users rely on multi-factor authentication wherever and whenever it is possible, starting with their password manager. To avoid having any gaps, we recommend requiring all users to set up MFA for Bitwarden.

Recommended Bitwarden Settings - Multi-Factor Authentication

Master Password Requirements

Each user has a “master password” within Bitwarden that is used to log into Bitwarden. It is critical that this master password follows current best practices. We recommend setting the requirements for master password strength as follows:

  • Turn on this setting
  • Require existing members to change their passwords so they are brought into compliance with the new policy
  • Setting the minimum complexity score to “Strong (4)”
  • Setting the minimum length to 20 characters

This format lends itself to the use of passphrases rather than passwords, which is a far more secure approach.

Recommended Bitwarden Settings - Master Password Requirements

Single Organization Setting

The “single organization” setting is important as it is necessary as it is a prerequisite for enabling account recovery administration (see next section).

However, by turning on the policy for “Single Organization,” users who are not owners or admins and are already a member of another organization will be removed from the organization. Users will receive an email about this change, and then they will need to remove themselves from other organizations before they can re-join your organization.

Recommended Bitwarden Settings - Single Organization

Account Recovery Administration

For an enterprise deployment, having account recovery administration turned on will be a huge help for your IT help desk. When staff members go on extended leave, they often forget their passwords, including their passwords for their password management tool. Having a mechanism in place for the IT help desk to be able to reset a password is a big win.

Recommended Bitwarden Settings - Account Recovery Enrollment

Vault Exports

The last of FireOak’s recommended Bitwarden settings is to disable individual users’ ability to export their vault data. This setting will prohibit users who aren’t owners or admins from exporting their data.

Recommended Bitwarden Settings - Vault Export

Words of Caution When Implementing Enterprise Policy Settings

The best time to implement these changes is before opening up Bitwarden for enterprise adoption. However, if your organization has already deployed Bitwarden and you’re trying to retroactively enhance security measures, you’ll need to do some extra planning and figure out the best course of action for your organization as some of these changes have impacts for existing users.

Pay attention to the warning messages in the Bitwarden settings to understand the implications of making changes that will impact existing users. For example, when changing the setting to require two-step login (MFA):

“Organization members who are not owners or admins and do not have two-step login setup for their account will be removed from the organization and will receive an email notifying them about the change.”

If your organization only has a few users, it might be best to coordinate with each of them before implementing the organization-wide policy. However, if Bitwarden was rolled enterprise wide, it might be necessary to take a different approach. But in either case, getting this setting enabled is critical.

Conclusion

Bitwarden is a great tool, but there are several recommended Bitwarden settings that we strongly recommend enabling for enterprise accounts. Without changing these settings at an enterprise level, users – even well-intentioned ones – will stick to defaults and won’t implement many of the important controls that are designed to protect organizational information, data, and knowledge. If at all possible, we recommend implementing these enterprise policies before onboarding new users for your organization. If it’s too late for that, it will require an additional level of change management, communication, and coordination with users. But even so, the extra layers of protection are worth it.

Need help with an enterprise Bitwarden deployment? Contact the FireOak team for help.

Share the Post: