+ All Categories
Home > Documents > Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security...

Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security...

Date post: 22-May-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
25
Multi-Factor Authentication & Zero Trust MACC 2019 Sorell Slaymaker Principal Consulting Analyst TechVision Research TechVision Research Corp. 2019 - All Rights Reserved
Transcript
Page 1: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Multi-Factor Authentication

& Zero Trust

MACC 2019

Sorell Slaymaker

Principal Consulting Analyst

TechVision Research

©️ TechVision Research Corp. 2019 - All Rights Reserved

Page 2: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

TechVision Research: What we do

Consulting

• Senior, C-level clients

• Bridge between board-level

strategies and technical solutions

Research

• Broad and deep experience

• Industry specialists

• Technology pioneers

• Global perspective

Identity and Access Management

Security and Risk Management

Data Architecture & Strategies

Digital Transformation

Innovation and Disruption

Privacy and Information Protection

Blockchain Adoption

Internet of Things

Network Architecture & Security

Public, Private and Hybrid Cloud

Take a client theme

Identity& Access

Management

Privacy& Consent

Cybersecurity

InformationAsset

Management

Architecture& Innovation

Providing deep knowledge to

inform executive decisions

and Connect the Dots

2

Page 3: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Agenda

• MFA Foundations

• Moving To 6 Factor Authentication

• Conditional & Continuous Authentication

• Stop Using SMS for MFA

• MFA & Zero Trust

• MFA Futures

• Q&A

3

Page 4: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Why We Care About MFA

From Verizon 2019 Data Breach Report

81% of breaches start

with either stolen and / or

weak passwords

190 days on average

to detect a data breach

80% of breaches

involve a privileged

account being exploited

1,000+ USdata

breaches yearly

Username & Passwords

Are Not Good Enough

Page 5: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Thesis• Multi-Factor Authentication is gaining traction as a best

practice for enterprise security programs.

• It is based on the premise that traditional, single factor

authentication schemes (like IDs and passwords) are

relatively easy to break

• MFA is one of the cornerstones of IAM infrastructure.

Page 6: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Business Drivers for MFA

• Business Facilitation

– the need to improve interoperability and efficiency through

interconnected systems to support employees, affiliates, business

partners and customers

• Enhancing User Experience

– simplifying the process of authentication and letting the end user not

have to remember another password

• Cost Containment

– planning to reduce the cost of management of multiple disparate

authentication systems and processes

• Security Effectiveness and IT Risk Management

– improving the level of assurance that maps to an identity for appropriate

authentication

• Support Administrative and End-user Efficiency and

Effectiveness

– consolidating the authentication infrastructure and better defining and

reducing the number of access points

Page 7: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

MFA In the IAM Reference Architecture

Page 8: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Agenda

• MFA Foundations

• Moving To 6 Factor Authentication

• Conditional & Continuous Authentication

• Stop Using SMS for MFA

• MFA & Zero Trust

• MFA Futures

• Q&A

8

Page 9: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

6 Factors For Authentication

Private & ConfidentialInformation

1. Who – Identity -Biometrics

6. How – Protocol - HTTPS

2. What you have & know Device, username & pswd

4. Where – LocationGPS, Wifi, NFC, etc.

3. When – Time of the day

5. Why – Context – history

Page 10: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Level of Authentication is Based On Risk

Privileged Access Management (PAM) focuses on securing

access to high value systems and data

Page 11: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Balancing MFA Requirements• MFA must be deployed with a well-thought-out strategy that

weighs the risks, costs and usability

Page 12: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Agenda

• MFA Foundations

• Moving To 6 Factor Authentication

• Conditional & Continuous Authentication

• Stop Using SMS for MFA

• MFA & Zero Trust

• MFA Futures

• Q&A

12

Page 13: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

MFA In Conditional Authentication Pattern

ToD &

Duration

Page 14: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Agenda

• MFA Foundations

• Moving To 6 Factor Authentication

• Conditional & Continuous Authentication

• Stop Using SMS for MFA

• MFA & Zero Trust

• MFA Futures

• Q&A

14

Page 15: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

SMS is not SecureThe US Department of Homeland Security recommends that

government agencies and enterprises stop using SMS for

sensitive communication.

SMS Vulnerabilities No Encryption – SMS messages are sent as clear text that is readable by

anyone on the sender’s carrier network, anyone on the carrier-interchange

network, and anyone on the recipient’s carrier network.

SMS Hijacking – Organized crime and hackers may motivate international

mobile network operator employees to mis-direct SMS messages

SIM Swapping Exposure – The Subscriber Identity Module (SIM) inside a

smartphone is used to uniquely identify its owner. Criminals who gather

details about a victim such as their mobile phone number can get a

wireless network company to transfer a phone number to a new phone for

a short period of time.

Page 16: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Agenda

• MFA Foundations

• Moving To 6 Factor Authentication

• Conditional & Continuous Authentication

• Stop Using SMS for MFA

• MFA & Zero Trust

• MFA Futures

• Q&A

16

Page 17: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Microsoft Zero Trust Architecture

Page 18: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Zero Trust Hybrid/Multi-Cloud

Security

Vulnerability scanners

SIEM

CI/CD Pipeline

Cloud APIs i.e AWS

Host OS

Docker Engine

App

Infrastructure (Public or Private)

Orchestrators

Single Sign-On Providers

Host OS

AppZero Trust

Zero Trust provides a 1:1 mapping of users, devices,

services, applications, and data 18

Page 19: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Agenda

• MFA Foundations

• Moving To 6 Factor Authentication

• Conditional & Continuous Authentication

• Stop Using SMS for MFA

• MFA & Zero Trust

• MFA Futures

• Q&A

19

Page 20: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Evolution of Identity

Classic

IDM

IDaaS

Identity

as an

API

EmployeePerimeter

PartnerFederated

CustomerCloud/IDP

ThingsWallets, Chips

RelationshipsClaims, Context

On Premise

Directories

Networked

Identity Graphs

20

Great IAM is the foundation of great security

Page 21: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

What is Decentralized Identity?

• Potentially reducing the hundreds of

IDs/passwords often maintained today

• Move from BYOD to BYOI, to Decentralized

(AKA Self-Sovereign) Identity

• Identity control by identity owner like in the

physical world

• Peer-to-peer (no 3d party)

• Integrity of the identity record can be verified

via blockchain

• Stronger authentication via digitally signed,

verifiable credentials

• Better privacy by limiting non-essential

verification data

• Requires the development of an underlying

ecosystem

• Significant investment by Microsoft, IBM and

several early stage companies

Page 22: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Decentralized Identity

Enterprises should be evaluating Decentralized Identity as part of their

future-state IAM portfolio. There is a real opportunity to solve key security,

privacy and usability challenge across the Internet in a "game changing" way.

Page 23: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Key Take-Aways

1) Identity using MFA will be the cornerstone of enterprise and government security

2) The industry is moving from a 3-tier authentication model (something you know, have, are) to a 6-tier (adds location, time, context/history)

3) Avoid using SMS for highly-secure MFA

4) Decentralized identity and authentication without passwords is worth looking into

23

Page 24: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Q&A

24

Page 25: Multi-Factor Authentication & Zero Trust MACC 2019Zero Trust Hybrid/Multi-Cloud Security Vulnerability scanners SIEM CI/CD Pipeline Cloud APIs i.e AWS Host OS Docker Engine App Infrastructure

Thank You

©️ TechVision Research Corp. 2019 - All Rights Reserved 25


Recommended