Page 110 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 110

Strong  authentication  has  traditionally  been  synonymous  with  methods  of  multi-factor  authentication
            (MFA), most of which still rely on the use of a password of some kind. However, the unfortunate truth
            about  passwords  is  that  they  are  not  only  inherently  broken  but  are  also  the  most  ubiquitous
            authentication factor. Therefore, any implementation of multi-factor authentication is undermined by their
            inclusion.

            High-assurance  strong  authentication  is  what  many  industry  experts  believe  to  be  a  much  superior
            approach to securing accounts, in which multi-factor authentication is merged with biometrics. In the past
            five years alone, high-assurance authentication has been adopted on a mass scale, climbing from 5% in
            2017  to  16%  in  2018,  and  even more  so  up  to a  whopping  24%  in  2021. With  high-assurance and
            biometric authentication gaining traction in the U.S., the prevalence of password dependence still exists
            among 49% of users across their accounts. Despite this surprising percentage, the growing awareness
            of stronger authentication methods is promising for its implementation in the near future.

            As it currently exists, the widespread adoption of high-assurance authentication has largely been led by
            the FIDO Alliance. Since 2013, FIDO sought to enable strong authentication through an open set of
            standards and specifications that link user devices to a secure online service and then rely on biometric
            information stored on a particular device. Making this process more accessible appears to be the key to
            its ubiquity, but there are also loopholes that need to be addressed as device biometrics only authenticate
            the device owner, not the owner of the account they are trying to access. When this gap gets exploited
            by attackers, it further contributes to the growing fraud rates that we are experiencing.

            There are other issues that must be overcome to move towards the ubiquity of biometrics for consumer
            applications. Currently, FIDO credentials are only generated for a specific device, meaning that each
            device or browser must be separately provisioned in order to seamlessly authenticate access. Managing
            multiple devices is not only difficult, but from a consumer perspective also degrades the experience. As
            a result, the FIDO Alliance has called for the issuance of multi-device credentials that will enable users
            to authenticate from anywhere, at any time, and from any device.


            The transition to this model begs a few questions, the first being: how do you establish a high-enough
            level of assurance with a new user device that will allow for the entire set of credentials or keys to be
            entrusted to it? Secondly, how can digital assets be securely backed up and transferred without exposing
            them to potential compromise in transit or at rest whilst in vendor storage? And lastly, how does all of this
            happen across different device manufacturers who are disincentivized from working together?

            Because  biometric  information  is  stored  and  bound  to  the  specific  device,  it  cannot  be  relied  on  to
            authenticate from any other device, meaning the biometric samples from the original device will no longer
            be available, and the fallback will once again be other authentication factors with lesser assurance levels.
            Additionally, sending cryptographic assets to backup facilities exposes this information to eavesdropping
            by cyberattackers in transit. Finally, if a vendor’s facility is hacked into, all cryptographic keys stored can
            provide unfettered access to all of their accounts.

            The solution to address both of these challenges lies in a decentralized cloud infrastructure that can
            provide  high  levels  of  authentication  assurance  regardless  of  the  device.  Applying  biometrics  to  a
            decentralized cloud infrastructure aligns with the privacy principles of FIDO, where a user is in control of
            their biometric data, and the biometric itself is not accessible across multiple parties.





                                                                                                            110
   105   106   107   108   109   110   111   112   113   114   115