News

6/1/2016
11:00 AM
Sean Martin
Sean Martin
Slideshows
Connect Directly
LinkedIn
RSS
E-Mail
100%
0%

4 Steps to Achieve MFA Everywhere

What would it take to move authentication processes beyond sole reliance on passwords? Here's how to begin the journey.
Previous
1 of 6
Next

Image Source: imsmartin

Image Source: imsmartin

It’s one of the toughest challenges companies face in today’s connected and mobile world: Figuring out how to grant the least amount of privilege to allow users to get their jobs done while not putting their network and data at risk. Get this calculated balance wrong, and the teeter-totter tips in one direction or another—and neither option is great.

Given that 63% of confirmed data breaches (as reported in the Verizon DBIR) involved weak, default or stolen passwords, it should be painfully obvious that a reliance on passwords to overcome this challenge is not the best answer. Reliance on a single form of authentication—as Centrify’s CEO Tom Kemp puts it—“is brain-dead.”

“If a password is stolen, people can literally walk through the digital front door,” added Kemp during his opening talk at his company’s CentrifyConnect user conference.

Michael Hayden, retired U.S. General and the former National Security Agency Director, shared a similar position during his CentrifyConnect keynote: “Authentication and identity ought to be a very big deal for organizations.”

Andras Cser, vice president and principal analyst, security and risk management, at Forrester Research, was more direct with his view: “Passwords are dead—multi-factor authentication is a must.”

The truth is, there are a number of weaknesses associated with passwords—and they are becoming increasingly inadequate.

Cser also shared the following about passwords; they are or can be…

- Shoulder-surfed
- Decrypted (within milliseconds if less than 12 chars)
- Breached
- Reused
- Shared

As networks become software-defined, as systems connect with other systems, business-process orchestration takes over the core of a company’s operations, organizations need to not only consider human accounts for authentication, but also account for non-human (system) accounts when managing privileged accounts and privileged command execution. Of course, as we begin to introduce additional internet and network-connected devices and sensors as part of the swelling wave of Internet of Things, this authentication challenge will only become more complicated.

It’s should come as no surprise that most view the idea of implementing multi-factor authentication (MFA) “everywhere” to be an expensive, difficult and cumbersome endeavor.

Still, Kemp is on a mission to make “MFA Everywhere” a reality. His position is driven by the sheer fact that attacks are able to spread extremely easily by stealing usernames and passwords—and this reality isn’t going to change any time soon.

“This risk can be eliminated with the use of MFA everywhere,” said Kemp during an interview.

What would it take to make “MFA everywhere” a reality, moving authentication processes beyond sole reliance on passwords? Kemp, and some of his company’s users and conference speakers shared their thoughts on how to get started down the path to achieve MFA everywhere by following these four steps.

Note: The team at imsmartin would like to thank the team at Centrify for their contributions that led to this slide collection.

 

Sean Martin is an information security veteran of nearly 25 years and a four-term CISSP with articles published globally covering security management, cloud computing, enterprise mobility, governance, risk, and compliance—with a focus on specialized industries such as ... View Full Bio

Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SeanM902
50%
50%
SeanM902,
User Rank: Apprentice
6/2/2016 | 7:09:59 PM
Re: MFA All The Things Is Possible
Thank you for your comment AdamE896 .. I appreciate your thoughtful response, especially your calls to action for organizations to use MFA and for vendors to make it easier to use.
AdamE896
50%
50%
AdamE896,
User Rank: Apprentice
6/2/2016 | 2:29:59 PM
MFA All The Things Is Possible
I think this article is a fantastic start to talk about MFA. I would challenge organizations to go futher than adding MFA to critical systems. Most users want an option other than application passwords. The main roadblock to user conversion for MFA is ease of use. If MFA is as easy as or easier than password based authentication, users would adopt that process. Let's face it, everyone hates passwords. With a proper authentication alternative and good risk based adaptive security, we can MFA all of the things.
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16470
PUBLISHED: 2018-11-13
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
CVE-2018-16471
PUBLISHED: 2018-11-13
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to a...
CVE-2018-6980
PUBLISHED: 2018-11-13
VMware vRealize Log Insight (4.7.x before 4.7.1 and 4.6.x before 4.6.2) contains a vulnerability due to improper authorization in the user registration method. Successful exploitation of this issue may allow Admin users with view only permission to perform certain administrative functions which they...
CVE-2018-17614
PUBLISHED: 2018-11-13
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from th...
CVE-2018-8009
PUBLISHED: 2018-11-13
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.