Master Password Best Practices for Your Password Manager

Your master password is the single key to your entire vault. Getting it right — strong enough to resist attack, memorable enough to never forget — is the most important password decision you will make.

Master password best practices for password manager vault
1Why the Master Password Matters

Why Your Master Password Is the Most Critical Credential You Have

In the context of a password manager, your master password occupies a unique and critical role. It is the only key that can decrypt your vault — without it, your encrypted database of credentials is completely unreadable. If you forget it, there is no recovery option with zero-knowledge managers; the data is permanently inaccessible. If an attacker obtains it, they have access to every account in your vault simultaneously.

This asymmetric importance means your master password deserves far more careful attention than any other credential you manage. It should be the strongest password you have ever created, should not be used anywhere else under any circumstances, and should be protected against forgetting as carefully as against theft. The master password is simultaneously the last line of defence for your entire digital life and the one credential where forgetting it has permanent catastrophic consequences.

The threat model for a master password is somewhat different from regular account passwords. The immediate risks are: shoulder surfing when entering it, keyloggers on a compromised device, and brute-force attacks if the encrypted vault file is ever stolen and taken offline for cracking. These risks shape the design requirements: the master password must be long enough that offline cracking is infeasible (even against a stolen vault file), entered in ways that minimise shoulder-surfing risk, and typed on devices with reasonable confidence in their security.

  • Single key to all accounts: Obtaining your master password gives access to every account in your vault simultaneously
  • Non-recoverable by provider: Zero-knowledge means no one can help you recover a forgotten master password — prevention is essential
  • Offline cracking threat: Stolen vault files can be attacked offline at billions of guesses per second — length is critical
  • Never reuse: Your master password must be unique — reusing it anywhere eliminates the security benefit
  • Keylogger risk: Entered frequently — device security matters more than for passwords typed rarely
  • Strongest credential you own: Deserves the most careful creation and protection of any password in your life
How password managers protect your vault if targeted →
Master password as key to entire password vault
2Creating Your Master Password

How to Create the Ideal Master Password

A Diceware passphrase is the recommended format for a master password. Four to six truly random common words — "correct-horse-battery-staple" — provides sufficient entropy for the offline cracking threat model while being genuinely memorisable by most people. The Diceware method, using physical dice to select words from a standardised list, guarantees true randomness and eliminates the patterns that arise from human attempts to invent "random" phrases. The EFF's updated Diceware word list uses shorter, more common English words, making the resulting passphrases easier to memorise.

Your master password should be at least 20 characters. Four five-character words with separators typically achieves this. Six words provides approximately 77 bits of entropy — effectively uncrackable with current technology even if the vault file were stolen and subjected to offline brute force. At five words, you are at approximately 64 bits — still very strong, equivalent to a truly random 11-character password using the full ASCII character set. Do not let perfect be the enemy of good: four strong random words is substantially better than any password a human would invent.

Once created, the master password memorisation process is critical. Type it immediately twenty or thirty times in sequence to begin encoding it in muscle memory. Then use it as your normal vault unlock for a week, which typically cements it reliably. Do not rely on the biometric unlock exclusively during this memorisation period — biometric keeps you from practising the passphrase, and you may be in a situation where only the passphrase works. After a week of daily use, the muscle memory is typically robust enough to maintain with normal daily unlocking.

  • Use Diceware: Roll physical dice or use EFF's online tool — guarantees true randomness with no human patterns
  • Minimum 20 characters: Four random words with separators typically achieves this — five is better, six is excellent
  • EFF word list: More common words than original Diceware — easier memorisation without security compromise
  • Memorisation practice: Type it 20-30 times immediately after creation, then use daily for one week
  • Don't rely only on biometrics: Practice typing the full passphrase regularly to maintain muscle memory
  • Unique absolutely: Your master password must never be used for any other purpose or stored in any other location
Complete guide to passphrase creation methods →
Creating a strong master password passphrase
3Physical Backup

How and Where to Store a Physical Backup of Your Master Password

Despite the goal of memorising your master password, a physical backup is an essential safety net for several scenarios: a long illness or hospitalisation where you have not accessed the vault for weeks; recovery from a severe head injury; or simply the gradual memory fade that comes with not using it during an extended period away from technology. The backup should never be digital — no cloud notes, no email drafts, no encrypted files on your device — because any digital storage creates an attack surface that the master password should not be exposed to.

The appropriate physical backup format is a handwritten note on paper stored in a location that is physically secure but accessible to you (and in emergencies, to trusted contacts). Appropriate locations include: a fireproof home safe — particularly important for protecting against Hong Kong's occasional typhoon and flood events; a bank safety deposit box (appropriate for the most sensitive credentials); or a sealed, tamper-evident envelope in the custody of a trusted family member or solicitor as part of estate planning. The backup should also include any emergency access codes or 2FA backup codes for the manager account.

If you share a household or have dependents, consider who else needs to be able to access your vault in an emergency. 1Password and Bitwarden both offer emergency access features that allow designated trusted contacts to request vault access, with a configurable waiting period during which you can deny the request. This is distinct from the physical backup and addresses the scenario where you are incapacitated but your trusted contact does not have the physical backup. Both mechanisms together provide comprehensive continuity coverage.

  • Never digital backup: No cloud notes, email drafts, or files — digital copies create attack surfaces
  • Handwritten on paper: Physical paper in a secure location — fireproof safe, safety deposit box, or with trusted contact
  • Include 2FA backup codes: Store manager account 2FA recovery codes with the master password backup
  • Consider estate planning: Include vault access process in your estate documents — digital assets need succession plans too
  • Emergency access feature: Configure trusted contacts in 1Password or Bitwarden's emergency access feature
  • Test the backup: Verify you can access the physical backup and that it is correct before any scenario where you would need it
Complete password manager setup including backup →
Physical backup of master password in fireproof safe
4Day-to-Day Protection

Protecting Your Master Password During Daily Use

Because your master password is entered more frequently than any other password — typically at least once per device unlock or browser session — it faces more exposure opportunities than a typical account password. Good practices for day-to-day master password protection include: enabling biometric unlock so you are typing the passphrase less frequently in public, using auto-lock settings that lock the vault after a configurable idle period, and being aware of shoulder-surfing risk when entering it in public spaces.

Device security directly impacts master password security. If the device you use to access your vault is compromised by malware — including keyloggers — your master password can be captured as you type it, regardless of how strong it is. Keep your operating system and all applications updated, avoid installing software from untrusted sources, and use the built-in security features of your platform (Gatekeeper on macOS, Play Protect on Android). On devices you do not fully control — work computers managed by your employer's IT team, or public computers — do not enter your personal vault master password.

Changing your master password should be done infrequently but deliberately: when you have any reason to believe it may have been compromised (shoulder-surfed, device malware suspected), when making major life changes that affect trust boundaries (relationship changes, leaving a job), or after the physical backup has been potentially viewed by an unintended party. Routine rotation of the master password is not necessary and introduces the risk of forgetting the new one; change it only when there is a specific reason to do so.

  • Enable biometric unlock: Reduces public typing frequency — shoulder-surfing is a real risk in crowded HK environments
  • Auto-lock timeout: Configure the vault to lock after idle time — do not leave it permanently unlocked on shared computers
  • Device hygiene: Keep OS and apps updated — a compromised device defeats even the strongest master password
  • Never on untrusted devices: Do not enter your master password on work, shared, or borrowed computers
  • Change deliberately: Change master password when there is specific reason — not on a routine rotation schedule
  • Update backup: Whenever you change your master password, update the physical backup immediately
How password managers protect your vault →
Protecting master password entry from observation and keyloggers

One Strong Passphrase Protects Everything

A Diceware passphrase of five random words protects your entire vault. Set it up right once, back it up physically, and you are protected for years.

Related VPN Articles