Page 26 - GS220401
P. 26

CoverStory




        Credentials come in myriad form factors, which could be a   Multi-device credential
        physical token, biometric data, knowledge, a shared secret
        or combination of these things. "We use presented creden-  Authenticating from personal devices has become the
        tials to authenticate users – meaning if the credentials are   norm for consumers around the world, but what happens
        valid, we are satisfied that both parties are who they say   when the user replaces a phone or laptop that serves as a
        they are," Deignan said.                                login credential? A March 2022 white paper by the FIDO
                                                                Alliance,  How FIDO Addresses a Full Range of Use Cases,
        Multi-factor authentication, zero trust access          introduced a multi-device authentication capability that
                                                                facilitates secure logins across multiple channels. With
        Jeremiah Mason, senior vice president, head of product,   this solution, users with new devices would no longer
        authID.ai, has seen large and small businesses step up se-  have to buy a security key or fall back to a less secure,
        curity measures and increase their use of multi-factor au-  non-FIDO authentication method, researchers proposed.
        thentication, which requires individuals to use two differ-
        ent credentials when logging in to a website, mobile app   "We believe that the syncing of FIDO credentials, together
        or connected resource. "Since the onset of the pandemic,   with the Bluetooth alternative, allows FIDO authentication
        and spurred by a recent White House mandate, enterpris-  to not only be a suitable alternative for existing two-factor
        es and federal agencies are abandoning legacy-based cy-  deployments, but for the first time, be a viable solution for
        bersecurity tools and protocols in favor of more advanced,   use cases where deployments of two-factor authentication
        proactive cyber-defense alternatives," he said.         methods have proven difficult, and where consequently
                                                                consumers are stuck with passwords," FIDO researchers
        Mason maintained that organizations could harden secu-  wrote.  "This  approach reflects an  evolutionary step
        rity by replacing inherent trust with a zero trust access   in the FIDO ecosystem, delivering phishing-resistant
        (ZTA) approach. ZTA assumes all traffic is hostile and   authentication at a scale that rivals that of password-based
        grants access on a need-to-know basis, which creates an   authentication deployments."
        immutable audit trail of authorized user access and helps
        reduce risks and threats across an enterprise, he stated.   The FIDO Alliance was established in 2012 to drive
                                                                simpler, stronger authentication methods through an
        "Additionally, in the midst of heightened geopolitical   open, scalable, interoperable framework that reduces
        conflict and nation-state sponsored cyberattacks, we are   reliance on passwords. The organization has made
        seeing companies either thinking about implementing     significant progress over the past decade toward its goal
        or  implementing  MFA  on  a  broader  basis  by  removing   of creating stronger, private, easier ways to securely access
        passwords from MFA workflows to reduce the risk of a    online services, FIDO representatives stated.
        compromise," Mason said. "The movement towards pass-
        wordless MFA, which removes a shared secret from the    Passwordless journey
        workflow, also supports ZTA."
                                                                The passwordless journey can be challenging for global
        Device integrity                                        brands tasked with implementing advanced technologies
                                                                across multiple regions and regulatory landscapes while
        From Mason's perspective, authenticating individual us-  striving to deliver a consistent customer experience. This
        ers as they log in to websites and apps is not enough; their   topic was explored at FIDO's March 2022 Authenticate
        devices must also be authenticated. Fortunately, decision-  Summit, a virtual event featuring leading ecommerce and
        makers realize this and are propelling the market forward   security experts.
        to more secure cyber standards and practices, he noted.
                                                                Manish Gupta, director of global security at Starbucks,
        Deignan agreed, stating the device that is used to conduct   described authentication as  a platform that  offers
        a transaction must be authenticated so that a relying party   unlimited potential through its deep connection with end-
        can recognize if a clone or altered device has been inserted   users.
        into the mix to harvest payment data or redirect it to unau-
        thorized parties. "Terminals these days come in all shapes   "You could combine authentication with other technologies
        and sizes," he said. "Even a tablet or a mobile phone can be   to make it an enabler for ecommerce or for socioeconomic
        a payment device. This variety makes authentication even   efforts, or as a protector when viewed from a cybersecurity
        more difficult but necessary."                          lens, or a key component of digital transformation," Gupta
                                                                said. "The possibilities seem endless when you think of
        Payment transactions require a combination of security   what we can do. Let's continue to maintain the right balance
        measures, Deignan added, stating it's not enough to just   of usability, communication, branding, and security; and
        approve a payment, nor is it sufficient to just encrypt pay-  let's extend our thinking to the full end-user experience
        ment data. "Encryption scrambles valid data and counter-  and not just pigeonhole ourselves to authentication."
        feit or fraudulent data equally well," he said. "And tokens
        are great, but not a silver bullet, because if you can't au-  Agreeing that the FIDO Alliance has made significant
        thenticate a transaction, even if it's 'approved,' you can't   progress in driving standardization, interoperability and
        trust it."
        26
   21   22   23   24   25   26   27   28   29   30   31