v0.1.0-draft AI Drafted

1Password Business Hardening Guide

Security Last updated: 2025-02-05

Enterprise password manager hardening for 1Password Business SSO, policies, and vault security

Overview

1Password is a leading enterprise password manager protecting credentials for millions of users across businesses worldwide. As a central repository for sensitive credentials, API keys, and secrets, 1Password security configurations directly impact organizational security posture. Proper hardening ensures credentials remain protected with zero-knowledge architecture while enabling secure sharing.

Intended Audience

  • Security engineers managing password management
  • IT administrators configuring 1Password Business
  • GRC professionals assessing credential security
  • Third-party risk managers evaluating password managers

How to Use This Guide

  • L1 (Baseline): Essential controls for all organizations
  • L2 (Hardened): Enhanced controls for security-sensitive environments
  • L3 (Maximum Security): Strictest controls for regulated industries

Scope

This guide covers 1Password Business admin controls, SSO configuration, team policies, and vault security.


Table of Contents

  1. Authentication & SSO
  2. Admin & Team Policies
  3. Vault Security
  4. Monitoring & Compliance
  5. Compliance Quick Reference

1. Authentication & SSO

1.1 Configure SSO with Identity Provider

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 6.3, 12.5
NIST 800-53 IA-2, IA-8

Description

Configure SAML-based SSO to authenticate 1Password users through your corporate identity provider.

Rationale

Why This Matters:

  • Centralizes authentication management
  • Enables MFA enforcement through IdP
  • Supports automatic provisioning/deprovisioning
  • Provides consistent access policies

Prerequisites

  • 1Password Business plan
  • SAML 2.0 compatible identity provider
  • Admin access to 1Password

ClickOps Implementation

Step 1: Enable SSO

  1. Navigate to: 1Password Admin ConsoleSecuritySign-in
  2. Click Set up Single Sign-On
  3. Select SAML authentication

Step 2: Configure SAML

  1. Download 1Password metadata or note:
    • ACS URL
    • Entity ID
  2. Configure IdP application:
    • Upload metadata or enter manually
    • Configure attribute mappings (email, name)
    • Assign users/groups
  3. Enter IdP details in 1Password:
    • IdP SSO URL
    • Certificate
  4. Test SSO authentication

Step 3: Configure Unlock Options

  1. Navigate to: SecurityUnlock with SSO
  2. Configure how users unlock after SSO:
    • Biometrics: Allow Touch ID, Face ID, Windows Hello
    • Master Password: Require master password
  3. Balance security and usability

Time to Complete: ~1 hour


1.2 Configure SCIM Provisioning

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 5.3
NIST 800-53 AC-2

Description

Configure SCIM for automatic user provisioning and deprovisioning synced with your identity provider.

ClickOps Implementation

Step 1: Enable SCIM

  1. Navigate to: Admin ConsoleIntegrations
  2. Click Directory
  3. Select your identity provider
  4. Generate SCIM token

Step 2: Configure IdP SCIM

  1. In your IdP, configure SCIM provisioning
  2. Enter 1Password SCIM endpoint
  3. Enter SCIM token
  4. Configure provisioning:
    • Create users
    • Update users
    • Deactivate users
    • Sync groups

Step 3: Verify Sync

  1. Test user creation from IdP
  2. Verify user appears in 1Password
  3. Test deactivation removes 1Password access

2. Admin & Team Policies

2.1 Configure Account Password Policy

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.2
NIST 800-53 IA-5

Description

Configure master password requirements for 1Password accounts.

ClickOps Implementation

Step 1: Access Password Policy

  1. Navigate to: Admin ConsoleSecurityPolicies
  2. Click Account Password

Step 2: Configure Requirements

  1. Select policy strength:
    • Minimum: 10+ characters
    • Medium: 12+ characters
    • Strict: 14+ characters (recommended)
    • Custom: Define specific requirements
  2. Configure additional requirements if custom:
    • Uppercase letters
    • Lowercase letters
    • Numbers
    • Symbols

Time to Complete: ~10 minutes


2.2 Configure Firewall Rules

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 13.5
NIST 800-53 AC-17

Description

Configure IP-based access restrictions for 1Password access.

ClickOps Implementation

Step 1: Access Firewall Settings

  1. Navigate to: Admin ConsoleSecurityFirewall

Step 2: Configure Rules

  1. Configure allowed/denied access:
    • Allow countries: Specify allowed countries
    • Deny countries: Block specific countries
    • Allow IPs: Whitelist corporate IPs (L3)
    • Deny IPs: Block known bad IPs
  2. Configure rule priority

2.3 Configure Team Member Policies

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6

Description

Configure policies for team member permissions and capabilities.

ClickOps Implementation

Step 1: Access Team Policies

  1. Navigate to: Admin ConsolePolicies

Step 2: Configure Key Policies

Vault Creation:

  • Control who can create vaults
  • Restrict to admins for controlled environments

Sharing:

  • Configure external sharing restrictions
  • Require approval for external sharing (L2)

Travel Mode:

  • Enable/disable Travel Mode capability
  • Configure vault visibility during travel

Recovery:

  • Configure account recovery options
  • Enable/disable recovery group

Time to Complete: ~30 minutes


2.4 Implement Role-Based Access

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6(1)

Description

Configure role-based access for team administration.

ClickOps Implementation

Step 1: Review Default Roles

  1. Navigate to: Admin ConsoleTeam Members
  2. Review roles:
    • Owner: Full access (1-2 people)
    • Admin: Team management
    • Team Member: Standard user
    • Guest: Limited external access

Step 2: Assign Roles Appropriately

  1. Limit Owner role to essential personnel
  2. Assign Admin role for IT administrators
  3. Use custom roles for specific needs (Enterprise)

3. Vault Security

3.1 Configure Vault Permissions

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 3.3
NIST 800-53 AC-3

Description

Configure vault access permissions following least privilege principles.

ClickOps Implementation

Step 1: Review Vault Structure

  1. Navigate to: Admin ConsoleVaults
  2. Review existing vaults and permissions

Step 2: Configure Vault Permissions

  1. For each vault, configure:
    • Users: Individual access
    • Groups: Group-based access
    • Permission level: View, Edit, Manage
  2. Use groups for scalable management

Best Practice Vault Structure:

Vault Purpose Access
Employee Private Personal items Individual only
Team Shared Team credentials Team group
Infrastructure Server/API credentials IT group
Executive Sensitive business Executives only

3.2 Configure Item Sharing Policies

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 3.3
NIST 800-53 AC-3

Description

Configure how items can be shared within and outside the organization.

ClickOps Implementation

Step 1: Configure Sharing Settings

  1. Navigate to: Admin ConsolePoliciesSharing
  2. Configure:
    • Allow item sharing: Yes/No
    • Allow sharing with guests: Control external sharing
    • Require approval: For sensitive sharing

Step 2: Configure Link Sharing (L3)

  1. Enable/disable share links
  2. Configure link expiration defaults
  3. Require view limits

4. Monitoring & Compliance

4.1 Enable Audit Logging

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 8.2
NIST 800-53 AU-2

Description

Enable audit logging for security monitoring and compliance.

ClickOps Implementation

Step 1: Access Activity Log

  1. Navigate to: Admin ConsoleReportsActivity Log
  2. Review logged activities:
    • Sign-in events
    • Vault access
    • Item changes
    • Admin actions

Step 2: Configure SIEM Integration

  1. Navigate to: IntegrationsEvents
  2. Configure event streaming to SIEM:
    • Splunk
    • Azure Sentinel
    • Generic webhook
  3. Select events to stream

4.2 Monitor Security Dashboard

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 8.11
NIST 800-53 SI-4

Description

Monitor the security dashboard for insights and recommendations.

ClickOps Implementation

Step 1: Review Security Dashboard

  1. Navigate to: Admin ConsoleSecurity
  2. Review:
    • Watchtower alerts (compromised passwords)
    • Weak password detection
    • Reused passwords
    • 2FA adoption

Step 2: Address Findings

  1. Notify users of compromised passwords
  2. Enforce password updates for weak items
  3. Track 2FA adoption progress

5. Compliance Quick Reference

SOC 2 Trust Services Criteria Mapping

Control ID 1Password Control Guide Section
CC6.1 SSO authentication 1.1
CC6.1 Password policy 2.1
CC6.2 Role-based access 2.4
CC6.6 Firewall rules 2.2
CC7.2 Audit logging 4.1

NIST 800-53 Rev 5 Mapping

Control 1Password Control Guide Section
IA-2 SSO/MFA 1.1
IA-5 Password policy 2.1
AC-2 SCIM provisioning 1.2
AC-6(1) Least privilege 2.4
AU-2 Audit logging 4.1

Appendix A: Plan Compatibility

Feature Teams Business Enterprise
SSO
SCIM Basic Full
Custom Policies
Custom Roles
Activity Log Basic Full Full
SIEM Integration
Firewall Rules

Appendix B: References

Official 1Password Documentation:

API & Developer Tools:

Compliance Frameworks:

Security Incidents:

  • October 2023 — Okta Support System Breach: An attacker accessed 1Password’s Okta tenant using a compromised Okta support session. Activity was immediately detected and terminated; no 1Password user data or vault data was compromised. (1Password Incident Report)
  • 2024 — macOS Vulnerability (Patched): Researchers disclosed a vulnerability in the 1Password macOS app ahead of DEF CON 2024; 1Password patched it before public disclosure with no evidence of exploitation.

Changelog

Date Version Maturity Changes Author
2025-02-05 0.1.0 draft Initial guide with SSO, policies, and vault security Claude Code (Opus 4.5)

Contributing

Found an issue or want to improve this guide?