3406 It Director Guide Mfa
3406 It Director Guide Mfa
GUIDE TO
MULTI-FACTOR
AUTHENTICATION
“
Password isn’t exactly a four-letter word, but as a IT director, it should
be just as cringe-worthy. You don’t need to read every study or article
about the weaknesses of passwords—though there are plenty—to
know that single-factor authentication is putting your enterprise at risk.
[For those that] only offer
second factor protections
Two-factor authentication (2FA) provides an extra layer of protection.
that depend on SMS, it’s
Is it a step in the right direction? Sure. But it leaves something to be
desired in terms of both security and experience. Not only is 2FA time to wake up, smell the
notoriously unpopular with your users, it’s also not the sharpest targeted attacks, and give
security knife in the drawer, particularly if the second factor is delivered users better options.2
via text message.
Andy Greenberg, Wired
”
This weakness came into the public light in 2016 when attacks
on political figures were found to be a result of intercepted SMS
messages. Around the same time, the National Institute for Standards
and Technology (NIST) stopped recommending 2FA systems that use
SMS, because of their many security weaknesses. While 2FA is correct
in theory, “using SMS text messages isn’t technically two-factor at all,” according to security researcher and
forensics expert Jonathan Zdziarski.1 He asserts there are better tools that can actually prove possession of
the “what you have” factor.
1
Andy Greenberg, “So Hey You Should Stop Using Texts for Two-Factor Authentication,” Wired, June 26, 2016, accessed Feb 23,
2017 at https://www.wired.com/2016/06/hey-stop-using-texts-two-factor-authentication/
2
Ibid
QUICK
GUIDE THE IT DIRECTOR’S GUIDE TO MULTI-FACTOR AUTHENTICATION 1
01
HOW & WHY MFA WORKS
Multi-factor authentication begins with the notion that you can and should provide multiple factors for
authentication, not just a single static means. MFA goes beyond 2FA by requiring users to authenticate via
two or more different authentication factors as shown in Figure 1. By definition, it doesn’t limit the number
of authentication factors, but emphasizes the use of a broader set of factors across three main categories:
what you know, have and are. This provides flexibility and a better user experience, not to mention a stronger
security stance.
Combining multiple authentication factors results in a higher Level of Assurance (LoA) that the user
attempting to authenticate is who the user claims to be. The theory is that if one of the factors has been
compromised, the chances of the other factor also being compromised are low.
Authentication mechanisms can be distinguished by whether they use the same channel where the user
accesses the application, or a separate channel that’s dedicated for authentication. There’s also value in
authenticating via multiple factors of the same type, as long as compromising one factor doesn’t mean
compromising the other.
QUICK
GUIDE THE IT DIRECTOR’S GUIDE TO MULTI-FACTOR AUTHENTICATION 2
02
THE CASE FOR MFA
Digital transformation poses exciting opportunities for business and unprecedented challenges
for IT directors. You need to adopt new applications and cloud technologies to remain
competitive, but you must also minimize risk. On top of that, you need to place a larger focus
than ever on user experience to keep pace with competitors, encourage adoption and, ultimately,
achieve success.
Hitting the trifecta of security, cost and user experience isn’t easy. But it’s exactly what modern
MFA was made for.
LOWERED COSTS
When it comes to cost, hardware-based token solutions can’t hold a candle to utilizing
a user’s mobile device. Inherently flexible, modern MFA solutions allow you to step
requirements up or down depending on the risk of a particular activity. Doing so
reduces the cumulative costs of one-time SMS passcodes, voice calls or push methods
by employing those controls only when warranted. The investment in MFA is typically
offset by these cost reductions, coupled with the decrease in administrative costs
associated with reduced help desk intervention.
QUICK
GUIDE THE IT DIRECTOR’S GUIDE TO MULTI-FACTOR AUTHENTICATION 3
03
STEPPING UP YOUR SECURITY
When choosing the right authentication method for your enterprise, you want to consider a number of factors.
While not an exhaustive list, here are some of the most important:
The last point speaks to applying risk-based (or step-up) authentication to dynamically assess the risk
associated with the request and apply only the necessary amount of security. To step up your own security
and user experience, you can combine step-up authentication with passive contextual mechanisms.
Contextual MFA passively collects and analyzes contextual, behavioral or correlative factors, like geolocation,
computing environment and nature of the transaction being attempted. It collects data about the user to
establish a typical behavioral profile. If the user’s behavior falls outside of this, it steps up authentication
requirements. These operations are invisible to the user, so experience isn’t compromised, and also highly
reliable, minimizing vulnerability to attack.
Figure 2: Risk-based step-up MFA is triggered by atypical and anomalous context or behavior. It’s only when
the context collected via the first authentication factor indicates something unexpected that a second factor
of authentication is requested before access is granted.
QUICK
GUIDE THE IT DIRECTOR’S GUIDE TO MULTI-FACTOR AUTHENTICATION 4
03
04
MOVING BEYOND PASSWORDS
According to the latest Verizon DBIR, use of stolen credentials is the #1 cause of confirmed
data breaches. And many, if not all, of them could have been prevented with a stronger
authentication method.
By authenticating users on something they know (like a password), combined with something
they have or are, MFA provides a stronger level of security against attack. Stepping up MFA
with a risk-based approach using passive contextual authentication delivers the ultimate
combination of security, usability and cost-effectiveness.
If you’re ready to move beyond passwords—and we both know you are—we invite you to
discover how MFA can strengthen your security posture. The best way to get started is to try
our free 30 day trial now so you can quickly and easily secure your apps and data.
ABOUT PING IDENTITY: Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined
security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with
access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100
choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide
flexible options to extend hybrid IT environments and accelerate digital business initiatives with multi-factor authentication, single sign-on, access
management, intelligent API security, directory and data governance capabilities. Visit www.pingidentity.com. #3406 | 05.19 | v003
QUICK
GUIDE THE IT DIRECTOR’S GUIDE TO MULTI-FACTOR AUTHENTICATION 5