Bitwarden help pages are a really awesome resource.
If you store your TOTP seeds into bitwarden, all eggs are in the same basket. A compromise of your bitwarden account means a compromise of all the accounts stored in it. Even if they have 2SV turned on.
Itās a balance between security and convenience, you have to decide where you feel more confortable.
I have my TOTP seeds in bitwarden, and focus my effort in protecting my bitwarden account.
I try to translate (@kpiris please correct me if Iām wrong):
āI have my TOTP seeds in bitwarden, and focus my effort in protecting my bitwarden account.ā
It means, he decided a bit more for the conveniency of using TOTP with the integrated authenticator in the Bitwarden password manager, instead of using the dedicated Bitwarden authenticator app (or any other 2FA/TOTP app for that matter).
And āprotecting the Bitwarden accountā would mean something like āthe usualā (not a comprehensive list):
āstrongā master password (most common recommendation: an at least 4-word random passphrase)
2FA for the Bitwarden account itself (preferably FIDO2, as itās the strongest form of 2FA here)
probably switching to Argon2 as KDF (instead of PBKDF2)
āreasonableā unlock interval (= time until it locks again)
use auto-fill and drag & drop with Bitwarden - avoid using the clipboard (and just in case: set a short ādelete clipboardā time)
regular backups
having an emergency sheet (with at least the email, master password and 2FA recovery code)
and some ābasicā security things like using only up-to-date devices (and keeping them up-to-date⦠security updates!), beware of phishing, keep all Bitwarden apps up-to-date, donāt use Bitwarden on a (likely) compromised device, no ācircular dependenciesā for your Bitwarden account etc.
⦠and this is always important, but all the more if you have āall eggs in one basketā (like the TOTP seeds also stored in your vault, as was the topic here)ā¦
Just one comment to that: hopefully you donāt have ācircular dependenciesā here, because if you need access to Bitwarden to access Proton Mail to access Bitwarden (your 2FA)⦠then you still get into trouble if you loose access to Bitwarden in the first place (for whatever reason⦠and put in other words: you need to be able to access Proton Mail - in your case - even if you didnāt have access to Bitwarden)
Better assume you can loose access (ābetter safe than sorryā). One server update (e.g.) that automatically logs out all your devices would be enough (and those kind of things can happen).
My āin shortā would be: You have to have a ābackupā of your 2FA method and/or must be able to access your Bitwarden-2FA even without access to Bitwarden. (simple analogy: donāt let your key for your car IN your carā¦)
PS: You donāt have your key (2FA) in your car (Bitwarden)⦠but if you need access to Bitwarden to get access to your car (2FA)⦠I hope you know what I meanā¦
I guess one first step might to get an overview of all possible 2FA methods. See here and all associated help sites, especially the āGuidesā for each method: Two-step Login Methods | Bitwarden Help Center
One important thing as a ā2FA-backupā is to safely store the 2FA-recovery code as a ālast fallbackā for your 2FA. Of course you also must be able to access that code, in the case you loose access to Bitwarden!
Maybe later in can write more - have an appointment nowā¦
Your emergency kit should include everything necessary to get back into your vault, presuming the only thing you have is a brand new PC/phone that you just picked up from the store.
Notably, if using MFA, it should include your Bitwarden recovery code. And, if you need access to your email to get back into Bitwarden, it should include your email username, password, and if applicable, its recovery code.
Seems @Nail1684 has already pointed out the fallacy of this assumption, but it bears repeating: there absolutely are situations in which all of your Bitwarden apps and browser extensions can become logged out at the same time ā and without warning. Too often, we see users who become permanently locked out of their Bitwarden vaults (losing access to all of their data) when their Bitwarden apps are unexpectedly logged out. Donāt let this be you (or your parents)!
On the topic of where to store TOTP keys for accounts that use TOTP as 2FA, for maximum security (which also implies maximum inconvenience), TOTP keys should be stored (and TOTP codes generated) in an app that is installed on a device where you are not also using Bitwarden. Therefore, if a device where you do use Bitwarden is compromised (by malware or physical theft, for example) and your vault is breached as a result, then the attacker will (presumably) be unable to access your accounts ā because they do not have access to the TOTP codes which are on a completely different device.
For maximum convenience, get a Premium subscription (or Family plan), and store the TOTP keys in your Bitwarden password manager, which allows the password manager to generate your codes (and to autofill those codes into your login forms). The risk is that you are unable to properly secure your Bitwarden apps (e.g., failing to keep malware off your devices), then your vault could become compromised, allowing an attacker to access all accounts stored in your vault (since they have both the password and the 2FA).
A compromise would be to use the more convenient approach (generating TOTP codes in Bitwarden) only for less important accounts, and use the more secure approach (keeping 2FA away from Bitwarden) for the more important accounts (banks, etc.).
There is a good beginnerās guide to Bitwarden floating around the Bitwarden sub on Reddit, and you might benefit from reading it.
Coming back to that point about ā2FA backup for Bitwardenāā¦
Since there are five ways to set up 2FA for Bitwarden (FIDO2, TOTP, email, Yubico OTP and DUO), there are numerous combinations of what one can do. So, in general I would say:
Having the 2FA recovery code is a must as an ultimate fallback for your Bitwarden 2FA. And that you must be able to access, if everything else fails. In your case: if you canāt login to Bitwarden and if you canāt login to Proton Mail. I myself have that printed out on paper, stored in a safe - and digitally stored as well (encrypted).
[BTW, the 3-2-1 backup rule could be also mentioned in that context⦠in a short version: 3 copies, on 2 different media, at least 1 off-lineā¦]
As @DenBesten already wrote, in your case, you should also write down your Proton Mail username/email address, password and 2FA backup code (or whatever exists within Proton Mail as a fallback/backup for itās 2FA) on your āBitwardenā emergency sheet. That would enable you to access Proton Mail - with the Bitwarden 2FA recover code in it as of today, as you wrote before - even if you lost access to Bitwarden.
Then maybe only for convenience: you could also set up a second form of 2FA for Bitwarden as a āfallbackā (but this can also be problematic if it is āinsecurely doneā)⦠If I understand you correctly, you use email as 2FA for Bitwarden, right? You could also set up TOTP for Bitwarden - and here it is nice, that you can store the TOTP seed code / secret key (or a screenshot of the QR code, which essentially is/contains the TOTP seed code, but it is more comfortable to scan a QR code than type the seed code manually) also on your emergency sheet, so that you can set up that āTOTPā again, even if you lost your phone/2FA-app. (BTW, you could also only use TOTP that way, and deactivate email 2FA, if you wanted)
So essentially, the main points again: 2FA recovery code as the ultimate fallback - and maybe more than one form of 2FA (e.g. email and TOTP) or a form of 2FA which allows āa backupā in itself if you will call it that way (e.g. TOTP/TOTP-app - and storing the seed code/secret key on your emergency sheet).
⦠Hm, I think it was too long. I think it was too confused. It mainly focused the ābackupā/fallback problematic. I hope, someone can put meaning into my writings.