
“With our largest MSP and IT partners managing thousands of nodes and over 100 technicians, secure access to credentials is an ever-growing pain point. Dealing with employee turnover is not only a security issue, but a regulatory and compliance one as well. That’s why we’re excited to provide NinjaRMM customers with the most powerful and customizable way of managing credentials available from any RMM on the market."
How NinjaRMM Credential Exchange Works
NinjaRMM stores all that information in a secure cloud system. How secure? Here's the official, detailed answer that NinjaRMM shared with us:"The private key material is stored encrypted on a cluster of FIPS 140-2 Level 3 compliant physical Hardware Security Modules (HSM) within AWS’ secured datacenter. The physical HSM itself has no keys anywhere within its hardware components, nor operating system, to decrypt the private key material. This combination of the physical hardware, secured datacenter, and console management together form AWS’ CloudHSM service offering. AWS’ Key Management Service (KMS) uses the CloudHSM as the basis for creating a FIPS 140-2 Level 3 compliant CMK, which is now the private key used to create the client keys for each of NinjaRMM’s MSP partners. Only the Chief Technology and Security Officers have privileges to operate and leverage the CloudHSM cluster and CloudHSM-sourced CMK, as all access is locked down through a DENY-ALL policy ."
"We can’t speak to specific recent attacks for obvious reasons, including the fact that we don’t have full details. What we can say is NinjaRMM’s use of extremely tight key controls prevents theft of privileged access credentials. Credentials are encrypted and passed through an encrypted tunnel, preventing them from being exposed. Along with NinjaRMM’s explicit node approval feature eliminating unauthorized machines, the possibility for an honest mistake, or a disgruntled employee, or an external attacker to leverage any of NinjaRMM’s internal key and credential mechanisms to launch a remote control attack is further mitigated."
MSP Platform Security
As we pointed out the Credential Exchange arrives during a key time for the overall MSP software and IT service provider industry.Indeed, hackers are increasingly targeting MSPs and their underlying software systems for island hopper attacks that eventually penetrate end-customer systems, the FBI and Department of Homeland Security have repeatedly warned. At the same time, thousands of MSPs have failed to pinpoint next steps for business automation, potentially hurting their own business margins along the way.Amid those market realities, security-minded MSPs can leverage Credential Exchange to differentiate themselves from the market masses, according to Sferlazza. He notes:"Security is obviously top of mind not just for our customers, but for their customers, as well. Features like the Credential Exchange allow NinjaRMM customers to position security as one of their key strengths and differentiators. At the same time, this new functionality also allows them to operate more profitably by shaving significant time off their day-to-day management tasks. Both of those things are especially critical for MSPs and admins working in enterprise environments.”