46
You Can’t Spell Enterprise Security Without MFA Paul Madsen, Principal Technical Architect Office of the CTO Ping Identity Copyright © 2013 Ping Identity Corp. All rights reserved. 1

You Can't Spell Enterprise Security without MFA

Embed Size (px)

Citation preview

Page 1: You Can't Spell Enterprise Security without MFA

You Can’t Spell Enterprise Security Without MFA

Paul Madsen, Principal Technical Architect

Office of the CTO

Ping Identity

Copyright © 2013 Ping Identity Corp. All rights reserved. 1

Page 2: You Can't Spell Enterprise Security without MFA

Agenda

Copyright © 2013 Ping Identity Corp. All rights reserved. 2

•Why•What •Which•When & Where

Page 3: You Can't Spell Enterprise Security without MFA

WHY MFA?

Copyright © 2013 Ping Identity Corp. All rights reserved. 3

• Deficiencies & vulnerabilities of one factor mitigated by another (unless they are dependent)• Raises the bar for attackers• Compromise of one factor insufficient to enable attacker access to sensitive resources• Voted ‘Easiest to pronounce acronym’ 4 years in a row!

Page 4: You Can't Spell Enterprise Security without MFA

Copyright © 2013 Ping Identity Corp. All rights reserved. 4

Page 5: You Can't Spell Enterprise Security without MFA

5

I come not to bury passwords but to appraise them

Page 6: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

Page 7: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

multiple independent

Page 8: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

Dynamically ch

oosing from

multiple independent

Page 9: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

Dynamically ch

oosing from

implicit & explicit

authenticationmultiple independent

Page 10: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

/\

with the optim

al balance

of security, u

sability,

and cost

Dynamically ch

oosing from

implicit & explicit

authenticationmultiple independent

Page 11: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

/\

with the optim

al balance

of security, u

sability,

and cost

Dynamically ch

oosing from

implicit & explicit

authentication /\based on an assessment of

risk (determined by

analysis of various

contextual signals and

other considerations)

multiple independent

Page 12: You Can't Spell Enterprise Security without MFA

MFA is Using two or more login factors in

order to authenticate a

user

/\

with the optim

al balance

of security, u

sability,

and cost

Dynamically ch

oosing from

implicit & explicit

authentication /\based on an assessment of

risk (determined by

analysis of various

contextual signals and

other considerations)

multiple independent

Page 13: You Can't Spell Enterprise Security without MFA

13

Authentication Factors

Page 14: You Can't Spell Enterprise Security without MFA

Firstly, some secret thou knoweth, secondly some object thoust have in thy living, and thirdly some quality of thy p'rson

Page 15: You Can't Spell Enterprise Security without MFA

In practice•Something you forgot•Something you left at home•Something you are nervous about sharing

15

Page 16: You Can't Spell Enterprise Security without MFA

Key Authentication Trends

Trope doesn’t adequately acknowledge 1.Device as factor2.Local authentication3.Contextual verification

Page 17: You Can't Spell Enterprise Security without MFA

17

Device as factor

Page 18: You Can't Spell Enterprise Security without MFA

Phones make great *have* factors

•Connected•Computation•Storage•UI

Page 19: You Can't Spell Enterprise Security without MFA

Phones make great *have* factors

•Connected•Computation•Storage•UI

In a package a user won’t leave at home

Page 20: You Can't Spell Enterprise Security without MFA

yes

noIs device authenticated?

no

yes

User authenticated?

Enjoy public application

access

Authenticating device & user

Page 21: You Can't Spell Enterprise Security without MFA

yes

noIs device authenticated?

no

yes

User authenticated?

Enjoy partial application

access

User logs in from untrusted

device.

Enjoy public application

access

Authenticating device & user

Page 22: You Can't Spell Enterprise Security without MFA

yes

noIs device authenticated?

no

yes

User authenticated?

Enjoy partial application

access

Enjoy full application

access

Devi

ce

Regi

stra

tion

User logs in from untrusted

device.

Enjoy public application

access

Authenticating device & user

Page 23: You Can't Spell Enterprise Security without MFA

yes

noIs device authenticated?

no

yes

User authenticated?

Enjoy partial application

access

Enjoy full application

access

Devi

ce

Regi

stra

tion

User logs in from untrusted

device.

Enjoy public application

access

Authenticating device & user

Enjoy partial application

access

Page 24: You Can't Spell Enterprise Security without MFA

Stand up straight

Copyright © 2013 Ping Identity Corp. All rights reserved. 24

• If relying on device authentication, the ‘device posture’ of that device becomes paramount

• This ‘device posture’ includes aspects like PIN, malware, screenshot enabled etc

• In the enterprise, EMM solutions allow IT to define & enforce policies over device posture – and (in emerging trend) to report current situation into authentication systems

• Work underway in the Identity Defined Security Alliance to normalize this pattern

Page 25: You Can't Spell Enterprise Security without MFA

25

Local authentication

Page 26: You Can't Spell Enterprise Security without MFA

Local authentication

• Capabilities of phones also make practical a model where the verification check is performed locally, ie on the device• As used for ‘device unlock’ – the user logically authenticates to the device• Local authentication (particularly for biometrics) has privacy advantages – no secrets on the server

Page 27: You Can't Spell Enterprise Security without MFA

FIDO Alliance

Copyright © 2013 Ping Identity Corp. All rights reserved. 27

• The issue with leveraging local authentication is how – A server can prompt the client to perform an authentication

– How client can ‘prove’ to server that it did so• FIDO Alliance normalizes the above pattern• Abstracts away from the server the specifics of the local authentication on the client via an asymmetric cryptographic challenge/response pattern• Inherently multi-factor – must have the private key as well as the local factor (either know or are)

Page 28: You Can't Spell Enterprise Security without MFA

28

Contextual verification

Page 29: You Can't Spell Enterprise Security without MFA

Contextual verification

• Contextual verification is a model of passively collecting signals & parameters from the user’s environment and analyzing/comparing them to identify anomalies (from expected)

• In the context of authentication, supplements (or in some instance replaces) traditional overt & explicit logins.

• Valuable because it can increase assurance without negative usability implications

• Signals can be collected via multiple channels & touchpoints, e.g. device, browser, agents

• Assumption is that attacker unlikely to be able to simulate all signals in order to impersonate valid user

• Manifests as • Geofencing• Device fingerprinting

Copyright © 2014 Ping Identity Corp. All rights reserved. 29

Page 30: You Can't Spell Enterprise Security without MFA

Explicit giving way to implicit

Copyright © 2014 Ping Identity Corp. All rights reserved. 30

Explicit

Implicit

Trend

Explicit

Implicit

Page 31: You Can't Spell Enterprise Security without MFA

31

Choosing Factors

Page 32: You Can't Spell Enterprise Security without MFA

Considerations when picking factors

Copyright © 2013 Ping Identity Corp. All rights reserved. 32

• IT benefits Is the authentication method easy to deploy? Will it require additional IT resources? Can it work across multiple channels, e.g. online, telephony, etc?

• Usability Is the authentication method easy to use? Will end users accept the new process? Can users be expected to have a device capable of supporting a particular mechanism? Will users be concerned about privacy?.

• Initial costs Is there a cost per user that will grow every time a new user is added? What is the replacement cost – both for the device and its associated administrative burden?

• Deployment costs What are the costs associated with deploying the authentication mechanism. Is client hardware or software required? If so, how is that distributed to consumers and what are the associated costs?

Page 33: You Can't Spell Enterprise Security without MFA

Copyright © 2013 Ping Identity Corp. All rights reserved. 33

Page 34: You Can't Spell Enterprise Security without MFA

Analysis

Lowassurance

Highassurance

Poor usability

Goodusability

Smart cards

OTP Hardware token

Passwords

Mobile authentication app

Device fingerprinting

Low cost

Medium cost

High cost

SMS OTP

Page 35: You Can't Spell Enterprise Security without MFA

Analysis

Lowassurance

Highassurance

Poor usability

Goodusability

Smart cards

OTP Hardware token

Passwords

Mobile authentication app

Device fingerprinting

Low cost

Medium cost

High cost

SMS OTP

FIDO?

Page 36: You Can't Spell Enterprise Security without MFA

36

Recommendations

Page 37: You Can't Spell Enterprise Security without MFA

Risky business

Copyright © 2013 Ping Identity Corp. All rights reserved. 37

• Risk-based MFA demands that resources be analyzed for the risk of their compromise

• OMB m04-4 defines a model for assessing risk of an authentication mistake - determined by– Potential harm or impact

– Likelihood of the authentication mistake

• ‘Harm’ includes– Financial loss, damage to reputation, personal

safety, civil/criminal prosecution

• Once risk has been assessed, authentication factors can be chosen accordingly

Page 38: You Can't Spell Enterprise Security without MFA

Break away from password hegemony

Copyright © 2013 Ping Identity Corp. All rights reserved. 38

Page 39: You Can't Spell Enterprise Security without MFA

Flexibility

Copyright © 2013 Ping Identity Corp. All rights reserved. 39

• Particularly for consumer space, provide different options for MFA factors

• Both to support heterogeneous user base and to offer fall back mechanisms if and when a particular factor doesn’t work, e.g. if a mobile phone is offline or if the consumer is roaming, fall back to a generated OTP

Page 40: You Can't Spell Enterprise Security without MFA

40

MFA 2.0

Page 41: You Can't Spell Enterprise Security without MFA

MFA 2.0

1. Factor in context1. Anomalies initially determined by policy, allow for

natural learning future 2. Risk it

1. Choose authentication factors based on assessment of risk

2. Rely on contextual verification when possible3. Device advice

1. Leverage local authentication and device authentication2. Be sensitive to device posture

Copyright © 2014 Ping Identity Corp. All rights reserved. 41

Page 42: You Can't Spell Enterprise Security without MFA

MFA 2.0

Copyright © 2014 Ping Identity Corp. All rights reserved. 42

Risk & Policy EngineRisk & Policy Engine ContinueContinueStart Start

Active AuthenticationActive Authentication

DenyDeny

BehaviorBehaviorContextContext

External External Feeds Feeds

Community Community Intelligence Intelligence

DenyDeny

BehaviouralFeedback

CorrelatioCorrelationn

Environment Environment

ApplicationApplicationinfoinfo Policy Policy

Page 43: You Can't Spell Enterprise Security without MFA

Policy

DataCopyright © 2014 Ping Identity Corp. All

rights reserved. 43

IdP

Device

Environment

Authentication

MFA

Page 44: You Can't Spell Enterprise Security without MFA

Policy

DataCopyright © 2014 Ping Identity Corp. All

rights reserved. 44

IdP RP

Device

Environment

Authentication

MFA Authorization

Page 45: You Can't Spell Enterprise Security without MFA

45

The M

is table stakes

Page 46: You Can't Spell Enterprise Security without MFA

46

Thanks