Future-Proofing Your Authentication Infrastructure WP
Future-Proofing Your Authentication Infrastructure WP
Key Strategies for Maximizing Security and Flexibility in the Long Term
wHITE pApEr
Executive Summary
Sophisticated attacks have placed a heightened premium on strong, multi-factor authentication. However, as the proliferation of cloud services and enterprise-connected mobile devices continues, the process of deploying and maintaining authentication threatens to grow more costly and complex. This paper uncovers key strategies organizations can employ in order to adapt to todays evolving IT dynamics, while persistently safeguarding sensitive corporate assets.
Cloud Adoption The broad and rapid adoption of cloud-based services poses significant implications for those tasked with administering authentication: How can they move forward with such initiatives as single sign-on (SSO) and identity federation when their IT services are fueled by a mix of cloud and on-premise infrastructures? How can organizations migrate to the cloud while ensuring ongoing compliance with all relevant regulatory mandates? When customers move applications from on-premise infrastructures to the cloud, they still want to maintain control over identity stores like Active Directory, said Andrew Young, VP of Authentication at SafeNet. This presents fundamental changes in the makeup of the user community that authentication must support. Following are a few of the most significant implications the cloud has on authentication: Increased demand. In the past, many enterprise security teams would only require multifactor authentication for remote users. When cloud services are employed, effectively every user becomes a remote user. Therefore, organizations need to employ and support strong authentication for all users of cloud applications. Blurred boundaries. The move to the cloud also erodes traditional boundaries. Now, an application can leverage data from internal and external sources, and support a mix of trusted and untrusted users. Thus, highly virtualized cloud infrastructures require the support of heterogeneous users and systems. Heightened insider threats. For years, insider threats have been a persistent and difficult challenge. Particularly with the move to virtualized, public cloud offerings, organizations must contend not only with privileged access of internal employees, but of the administrators employed by the cloud providers themselves. Diversified cloud models. Authentication controls need to be mapped to the specific characteristics of each type of cloud deployment, whether software as a service (SaaS), platform as a service (PaaS), or infrastructure as a service (IaaS).
In working with clients, I always underscore the importance of asking questions, stated Mike Rothman, Analyst and President, Securosis. Currently, many enterprise decision makers are at the stage in their cloud migrations where they dont know what they dont know. For example, leadership will be unclear on such areas as standards in public cloud environments and where data integration points will be. Its important to continue to get educated about the impact various cloud models will have on authentication infrastructures.
In working with clients, I always underscore the importance of asking questions, stated Mike Rothman, Analyst and President, Securosis. Currently, many enterprise decision makers are at the stage in their cloud migrations where they dont know what they dont know. For example, leadership will be unclear on such areas as standards in public cloud environments and where data integration points will be. Its important to continue to get educated about the impact various cloud models will have on authentication infrastructures. Mobile Device proliferation Within many enterprises, the use of smartphones and tablets to access corporate networks and assets was a nightmare scenario for IT and security organizations. As such, the acceptance of these devices was understandably blocked for as long as possible. Yet, at some point, especially as senior management began to demand access from their mobile devices, the flood gates were opened, giving way to what Young calls a Wild West scenario, in which it is difficult for security staff to gain visibility, let alone establish control, over access to corporate assets. Clearly, the risk posed by these scenarios is great. Rather than malware, the key issue confronting security staff is management: ensuring only trusted devices can access corporate resources, contending with lost devices, managing security policies, and enabling and monitoring access. These devices also present password vulnerabilities: passwords stored on mobile devices can be easily compromised because they are stored in a password cache. Finally, IT organizations need to establish visibility and control over what assets can be accessed by, and saved onto, mobile devices. As Rothman revealed, When it comes to mobile device proliferation, whatever the platform whether Android, iOS, or Windows Phone 7the issues are remarkably consistent. In spite of their small form factors, these mobile devices are, in effect, computers. If lost, they can present the same potential damage as a lost laptopand its a lot easier to lose a handheld device than a laptop.
Hardware
Organizations can choose from a range of hardware devices, including USB tokens and credit-card form factors. while the variances of hardware-based authentication mechanisms are many, in general, these offerings can be grouped into one of the following categories: One-time password (OTp). These solutions have screens that display a randomly-generated set of alphanumeric characters that constitute a password that can be used once. Certificate-based. Certificate-based hardware offerings use public key infrastructure (PKI) and digital client certificates for identifying users and controlling access. Hybrid. Hybrid tokens that provide a combination of approaches. For example, some methods combine OTP and certificate-based authentication within a single device. Others combine out-of-band transaction signing and OTP authentication.
Software
Today, there are many multi-factor authentication solutions that do not require hardware components. These software-based solutions fall into the following categories: OTp. Software-based OTP solutions can be installed on desktops and mobile devices. When activated, a solution generates a password for one-time use. Certificate-based. These software alternatives leverage PKI for the generation of digital certificates that are used for authentication. Out-of-band. Out-of-band authentication employs two channels of communication, for example, delivering a passcode via an SMS message to a users authorized phone.
Strategy #2: Centrally Manage Authentication, Across Tokens and Use Cases
As outlined above, within an enterprise, a host of varying use cases may be in play, and security administrators need to select the type of authentication solution that best meets the needs of each specific use case. For example, sales people might need strong mobile authentication when remotely accessing corporate resources; privileged users, such as system administrators, who have access to critical applications, would need a more robust level of multi-factor authentication. Given that, a range of authentication mechanisms may need to be employed in a specific enterprise. However, from a budget, security, and time management perspective, organizations simply cant afford to manage each type of authentication mechanism through a different management platform. Its essential to leverage different authentication mechanisms that can be managed through a central, unified platform.
Organizations should use the right form factor for the right use case, but do so without introducing a lot of overhead in terms of management. Establishing a more flexible infrastructure, while providing efficient management, is of paramount importance.
Management leverage is critical, Rothman explained. Organizations should use the right form factor for the right use case, but do so without introducing a lot of overhead in terms of management. Establishing a more flexible infrastructure, while providing efficient management, is of paramount importance.
Conclusion
Strong multi-factor authentication is vital todayand is only growing more so as organizations continue to embrace more mobile devices and cloud-based services. To address these trendswhile safeguarding sensitive corporate assetssecurity teams must employ several core strategies. With solutions that offer unrivaled breadth, manageability, and control, SafeNet enables organizations to effectively and efficiently employ these strategies.
About SafeNet
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its customers most valuable assets, including identities, transactions, communications, data, and software licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies, and in over 100 countries, trust their information security needs to SafeNet.
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: www.safenet-inc.com/connected
2011 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. WP (EN) A4-6.7.11