Selecting a Strong Authentication Solution Scott Mackelprang, V.P. of Security Digital Insight.

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
1 EBIP Synthesis Report Preliminary policy messages Vladimir López-Bassols, OECD EBIP Workshop October 2001, Rome.
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
1 Effective, secure and reliable hosted security and continuity solution.
Technology Acceptance Model. Copyright 2007 Black & Rossi, LLC All rights reserved 10/15/05 Black & Rossi, LLC, all rights reserved Who we are Technology.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Information Security Policies and Standards
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ECM Project Roles and Responsibilities
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Cloud Usability Framework
Network security policy: best practices
Two Factor Pilot Project Security Liaisons 4/10/13 Joshua Beeman Melissa Muth.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Windows 2003 and 802.1x Secure Wireless Deployments.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
5 February 2003 Reality and Future Softswitch - Reality and Future Nikolay Ilyin Chief Technical Officer RealEast Networks ITEXPO.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
WIRELESS LAN SECURITY Using
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
“Stronger” Web Authentication: A Security Review Cory Scott.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Single Sign-On in the Danish Educational Sector Per Thorboll Deputy director UNI-C.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Quarterly Customer Meeting Office 365 License Activation and Office 365 Cloud Services Assessment Status April 2014.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Case Study: Cisco VPN Client
Secure Connected Infrastructure
An assessment framework for Intrusion Prevention System (IPS)
Tim Carter Sales Director Sybase Confidential Propriety.
Tim Carter Sales Director Sybase Confidential Propriety.
Cloud Testing Shilpi Chugh.
Capitalize on modern technology
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Today’s Agenda Dealing with Vendors Consultants Contracts
Presentation transcript:

Selecting a Strong Authentication Solution Scott Mackelprang, V.P. of Security Digital Insight

Slide 2 Vendor view of the FFIEC Guidance The recent strong authentication guidance was good – For the financial industry For vendors and providers For end users Unified guidance through the FFIEC was right way to do it Relieved concern of conflicting guidance Best approach for new significant changes going forward Strict vendor neutrality was appropriate One year deadline was about right Will be challenge for some, but a deadline was needed

Slide 3 Step 1: Determine What the FI’s Want FI attitudes towards changes in the End User Experience How intrusive? How much effort/burden for end user How complicated? Degree of sophistication required of end user How much user mobility? Allow end users to roam? How much inconvenience will roaming entail? How to address shared accounts? Shared authentication credentials allowed? How to register users for strong authentication?

Slide 4 Step 1: Determine What the FI’s Want FI administrative wants and needs How much security? Not all solutions offer equivalent protection Additional computer peripherals okay? Some solutions require additional peripherals on PC Implement more than one technology? Some solutions are complimentary Implement all users at once or one user at a time? Big bang vs. one by one Needed how soon in order to meet deadline? FI’s inertia will impact rollout effort What impacts are there to account aggregation? Secondary methods to back up the strong authentication? Non-mobile solutions, forgotten passwords, etc

Slide 5 Step 2: Clearly Establish your Objective What’s more important Prevent theft of credentials or… Prevent use of stolen credentials Phishing makes the headlines but…. Strong authentication doesn’t just address phishing Other important threats must be considered Remote access trojans Man in the middle attacks New emergent threats Going to solve only the authentication problem? What about authorization? Commercial, retail, administrative: All use same approach?

Slide 6 Step 3: Evaluate Technology Options Synchronous token Somewhat expensive, heavier administrative model, supports mobility very well, choice of early adopters USB token Commodity priced, moderate administrative model Smartcard Lacks supporting infrastructure in US, good authorization features Shared secrets Not as strong as other mechanisms, good for backup to primary method Asynchronous Password generating token Can lower cost of token (matrix cards, scratch lists, etc), moderate to high administrative model

Slide 7 Step 3: Evaluate Technology Options Biometrics Fingerprints infrastructure rolling out now, non-fingerprints have high infrastructure barriers. Proprietary lock-ins common in biometrics Out-of-band communications Convenience and availability could be issues, good for backup in event of failures of primary approach IP address and geo-location Weak as a primary method, but could strengthen primary means. ‘Spoofable’. Shortcomings called out by FFIEC Client computer/network ‘fingerprinting’ Could have moderately heavy administrative model, simple for end user. Good supplement to primary techniques Digital certs on client (SSL client certs etc) Strong security, cumbersome to use broadly

Slide 8 Step 4: Narrow Options, then Test and Negotiate Leave time to fully negotiate license arrangements Vendors tend to want to charge on per user basis Evaluate and size the integration task for product software Staff as required to meet established deadlines Test scalability of selected technology Test security of selected technology Test usability through a pilot to the extent possible Test results should flavor the decision making process

Slide 9 Step 5: Develop and Test Solution EXAMPLE - Digital Insight’s Solution and Priorities DI selected a solution that provided 3 levels of authentication Cookies Software download USB token Wanted sliding scale of protection without upgrades at server or client Wanted to protect against newly emerging threats, especially Man-In- The-Middle attacks DI expects man-in-the-middle attacks to become prevalent in 12 to 18 months DI is building a framework to support multiple technologies All FI’s may not be able to conform to a single technology selected by DI A framework will also serve authorization needs of financial services

Slide 10 Step 6: Roll Out the Solution Provide wide latitude for timing of rollout Flexibility is a must FI’s need many options in timing their rollout Not all FI’s will evaluate risk the same Not all have same product or risks Provide backup education to authentication failures well in advance E.g. DI provides 2 out-of-band mechanisms for unusual circumstance logins Provide consultative services for FI’s who will need the help

Slide 11 Step 6: Roll Out the Solution Broadly distribute communication to FI customers explaining implementation philosophy and process Roll out prerequisite infrastructure in advance of actual deployment of strong authentication technology to ease process Do it behind the scenes if possible Minimize impact on FI during the rollout itself Shorten lead time required of FI’s for their rollout Reduce work for FI to migrate to new solution Conduct focus groups through usability experts to establish helps for customers Create excellent Help text verbiage Help with collateral for FI’s to ‘sell’ end users on new technology Create FAQ’s designed to describe and educate at all levels