News

6/1/2016
11:00 AM
Sean Martin
Sean Martin
Slideshows
Connect Directly
LinkedIn
RSS
E-Mail
100%
0%

4 Steps to Achieve MFA Everywhere

What would it take to move authentication processes beyond sole reliance on passwords? Here's how to begin the journey.
Previous
1 of 6
Next

Image Source: imsmartin

Image Source: imsmartin

It’s one of the toughest challenges companies face in today’s connected and mobile world: Figuring out how to grant the least amount of privilege to allow users to get their jobs done while not putting their network and data at risk. Get this calculated balance wrong, and the teeter-totter tips in one direction or another—and neither option is great.

Given that 63% of confirmed data breaches (as reported in the Verizon DBIR) involved weak, default or stolen passwords, it should be painfully obvious that a reliance on passwords to overcome this challenge is not the best answer. Reliance on a single form of authentication—as Centrify’s CEO Tom Kemp puts it—“is brain-dead.”

“If a password is stolen, people can literally walk through the digital front door,” added Kemp during his opening talk at his company’s CentrifyConnect user conference.

Michael Hayden, retired U.S. General and the former National Security Agency Director, shared a similar position during his CentrifyConnect keynote: “Authentication and identity ought to be a very big deal for organizations.”

Andras Cser, vice president and principal analyst, security and risk management, at Forrester Research, was more direct with his view: “Passwords are dead—multi-factor authentication is a must.”

The truth is, there are a number of weaknesses associated with passwords—and they are becoming increasingly inadequate.

Cser also shared the following about passwords; they are or can be…

- Shoulder-surfed
- Decrypted (within milliseconds if less than 12 chars)
- Breached
- Reused
- Shared

As networks become software-defined, as systems connect with other systems, business-process orchestration takes over the core of a company’s operations, organizations need to not only consider human accounts for authentication, but also account for non-human (system) accounts when managing privileged accounts and privileged command execution. Of course, as we begin to introduce additional internet and network-connected devices and sensors as part of the swelling wave of Internet of Things, this authentication challenge will only become more complicated.

It’s should come as no surprise that most view the idea of implementing multi-factor authentication (MFA) “everywhere” to be an expensive, difficult and cumbersome endeavor.

Still, Kemp is on a mission to make “MFA Everywhere” a reality. His position is driven by the sheer fact that attacks are able to spread extremely easily by stealing usernames and passwords—and this reality isn’t going to change any time soon.

“This risk can be eliminated with the use of MFA everywhere,” said Kemp during an interview.

What would it take to make “MFA everywhere” a reality, moving authentication processes beyond sole reliance on passwords? Kemp, and some of his company’s users and conference speakers shared their thoughts on how to get started down the path to achieve MFA everywhere by following these four steps.

Note: The team at imsmartin would like to thank the team at Centrify for their contributions that led to this slide collection.

 

Sean Martin is an information security veteran of nearly 25 years and a four-term CISSP with articles published globally covering security management, cloud computing, enterprise mobility, governance, risk, and compliance—with a focus on specialized industries such as ... View Full Bio

Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SeanM902
50%
50%
SeanM902,
User Rank: Apprentice
6/2/2016 | 7:09:59 PM
Re: MFA All The Things Is Possible
Thank you for your comment AdamE896 .. I appreciate your thoughtful response, especially your calls to action for organizations to use MFA and for vendors to make it easier to use.
AdamE896
50%
50%
AdamE896,
User Rank: Apprentice
6/2/2016 | 2:29:59 PM
MFA All The Things Is Possible
I think this article is a fantastic start to talk about MFA. I would challenge organizations to go futher than adding MFA to critical systems. Most users want an option other than application passwords. The main roadblock to user conversion for MFA is ease of use. If MFA is as easy as or easier than password based authentication, users would adopt that process. Let's face it, everyone hates passwords. With a proper authentication alternative and good risk based adaptive security, we can MFA all of the things.
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8419
PUBLISHED: 2019-02-17
VNote 2.2 has XSS via a new text note.
CVE-2019-8421
PUBLISHED: 2019-02-17
upload/protected/modules/admini/views/post/index.php in BageCMS through 3.1.4 allows SQL Injection via the title or titleAlias parameter.
CVE-2019-8422
PUBLISHED: 2019-02-17
A SQL Injection vulnerability exists in PbootCMS v1.3.2 via the description parameter in apps\admin\controller\content\ContentController.php.
CVE-2019-7649
PUBLISHED: 2019-02-17
global.encryptPassword in bootstrap/global.js in CMSWing 1.3.7 relies on multiple MD5 operations for password hashing.
CVE-2019-8418
PUBLISHED: 2019-02-17
SeaCMS 7.2 mishandles member.php?mod=repsw4 requests.