Skip to main content

Compliance Response: Password Policy

Question

Describe your password policies. Does it include change frequency and complexity standards?

Response

Verifik does not use traditional password-based authentication. We employ a more secure authentication model using Time-based One-Time Passwords (TOTP) and SSH key-based access for infrastructure.

Authentication Model

TOTP-Based Authentication:

  • No Password Storage: We do not store passwords, eliminating password-related security risks
  • OTP via Email/Phone: All user authentication uses One-Time Passwords (OTP) delivered via email or SMS
  • Time-Limited Tokens: OTPs expire after a short time window (typically 5-10 minutes)
  • Single-Use: Each OTP can only be used once, preventing replay attacks
  • JWT Token Issuance: Upon successful OTP verification, cryptographically signed JWT tokens are issued for session management
  • Token Expiration: JWT tokens include expiration timestamps and are automatically invalidated

Benefits of TOTP Approach:

  • Eliminates password reuse and weak password vulnerabilities
  • No password database to compromise
  • Reduces phishing attack effectiveness
  • Provides stronger security than traditional passwords

Infrastructure Access (SSH)

SSH Key-Based Access:

  • No Password Authentication: SSH access to servers uses public key authentication only (password authentication disabled)
  • Key Management: SSH keys are managed through secure key management practices
  • Key Rotation: SSH keys are rotated regularly and upon security incidents
  • Access Control: SSH access is restricted to authorized personnel with specific key-based permissions
  • Google Cloud Platform: Server access is managed through GCP IAM and Compute Engine security policies

Security Standards

OTP Security:

  • OTPs are hashed using bcrypt before storage (if temporarily stored)
  • OTP delivery uses secure channels (TLS-encrypted email/SMS)
  • Rate limiting prevents brute force attacks
  • Failed authentication attempts are logged and monitored

Token Security:

  • JWT tokens are cryptographically signed using secure secret keys
  • Tokens include expiration and can be revoked immediately
  • Token validation occurs on every API request
  • Token payloads do not contain sensitive information

Access Management

  • Multi-Factor Authentication: OTP-based authentication provides inherent MFA (something you have - device, something you know - access to email/phone)
  • Session Management: JWT tokens provide secure session management without password storage
  • Revocation: Tokens and SSH keys can be immediately revoked upon termination or security incident
  • Monitoring: All authentication attempts (successful and failed) are logged and monitored

Compliance Alignment

This authentication model aligns with:

  • NIST Guidelines: Eliminates weak password vulnerabilities
  • OWASP Best Practices: Stronger than password-based authentication
  • SOC 2: Secure access controls without password management overhead
  • Zero Trust Principles: Continuous verification through time-limited tokens

Contact: security@verifik.co | privacy@verifik.co


Verifik LLC - 30 N Gould St, Ste 30338, Sheridan, WY 82801