Cerby helps organizations secure access to applications that are traditionally difficult to manage through standard identity systems. Because passwords are often the most sensitive piece of access data in these applications, Cerby provides a multi-layered protection model designed to safeguard them throughout their lifecycle.
Cerby’s password protection strategy is built on four core principles:
Strong encryption: All sensitive information stored in Cerby is encrypted using industry-standard methods.
Granular access controls: Organizations can define who can access or use password data.
Operational security features: Automated and user-initiated capabilities help maintain healthy password hygiene.
These principles work together to help secure access to applications where federated identity is not available.
Encryption and data protection
Cerby uses modern encryption practices to protect the sensitive information stored in your workspace. Passwords and secrets are encrypted before they are stored, and only authorized users and devices can access them based on your organization’s configuration and policies.
Cerby supports multiple encryption approaches, ensuring that all sensitive data is encrypted both at rest and in transit. Only authorized, authenticated users can access decrypted information.
This encryption strategy enables secure storage across the Cerby platform, including:
Saved account passwords
Time-based one-time passcodes (TOTPs)
Backup codes
Secrets
Optional file-based secret content
Users maintain access to their sensitive information based on the devices and security configurations approved by their workspace administrators.
Access control with roles
Cerby uses a role-based access control (RBAC) system to define user permissions for shared accounts. Each role determines what a user can do, ranging from managing account access to viewing sensitive information, such as passwords.
Users who add accounts to Cerby are automatically granted the account Owner role. When they share their accounts with other users for collaboration purposes, they can grant them one of the following roles:
Owner: Users with this role can share accounts, manage access and account configuration, and view passwords through the user interface (UI) and API responses.
Collaborator: Users with this role can only view passwords through API responses for account login with Cerby; viewing passwords through the UI is restricted.
For more information about roles and permissions, read the article How Cerby manages roles.
Automated password management
With Cerby, organizations can update their passwords as part of their regular access hygiene policies, enabling the following:
Reduce the risk of unauthorized access.
Ensure access stays aligned with company policy.
Maintain consistency across multiple shared accounts.
Administrators and users with appropriate permissions can also perform updates as needed from the Cerby interface.
Secure password generation
Cerby provides tools to help generate new, strong passwords based on customizable strength requirements. These tools help users set passwords that meet internal or external standards, supporting a more secure posture across unmanaged apps.
Configurable viewing restrictions
Cerby enables organizations to customize whether password values can be displayed in the user interface (UI) to specific users. This characteristic ensures that sensitive data is protected in accordance with your internal policies.
The following are some examples of configurable restrictions:
Whether Collaborators may view a password directly.
Whether users can copy a password from the Cerby client apps.
Whether password values can be shown in specific interfaces.
Trusted devices and secure access
Cerby supports device-level verification to ensure that password access is tied to trusted devices and authenticated user sessions. This support adds a layer of protection and helps keep sensitive information secure across Cerby’s client surfaces.
