Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Is Conditional Access the Right Approach to Authentication? It Depends.

What You Need to Know to Make Sure You’re Headed in the Right Direction on Your Authentication Journey.   

As Risk-Based Authentication Methods Continue to Evolve, Is It Time to Revisit Your Approach? 

What You Need to Know to Make Sure You’re Headed in the Right Direction on Your Authentication Journey.   

As Risk-Based Authentication Methods Continue to Evolve, Is It Time to Revisit Your Approach? 

If there’s one thing you can be sure of about user authentication methods today, it’s that determining the best choice isn’t as simple or straightforward as it used to be. There are more ways to authenticate users now than ever before, and as identity risks continue to evolve, new authentication methods are emerging all the time. So how do you know what’s going to make authentication more secure and efficient for your organization while also shifting the burden off users? Risk-based authentication is increasingly the answer – but it’s more nuanced than that. At its most basic, a risk-based approach may mean simply adopting static risk-based policies that support conditional access. But it can also mean leveraging artificial intelligence (AI) and machine learning (ML) to enable dynamic identity confidence scoring. Here’s what you need to know to make sure you’re headed in the right direction on your authentication journey.   

You’ve Come a Long Way Already. (Remember Browser Cookies?)

Risk-based authentication began simply enough, years ago, when websites began using browser cookies to recognize repeat visitors, eliminating the need for users to enter their credentials on every visit. The premise is simple: If you’re using the same browser on the same device, we trust that you’re the same person, and we don’t need to check your identity. But if you’re using a different browser, there’s a risk it’s not really you – so credentials are required. Today’s conditional access policies that are used to secure corporate resources are based on a similar principle. For example, you may recall “Judy,” the helpdesk representative I described in my previous column, who works at the same workstation in the same call center every day. To verify Judy’s identity, her employer uses a location-based conditional access policy that says if this person is in this call center location using a trusted device, the risk that she’s anyone else is minimal, and she’s not required to authenticate. But if someone ever attempts to log in from another location or a different device using Judy’s credentials, an additional layer of authentication will be applied to prove it’s really Judy (and to deny access if no proof is forthcoming). 

Conditional Access Depends on the Conditions. (Remember Greg?)

For a user like Judy, a location-based conditional access policy makes sense as a next step that goes beyond basic browser cookies to establish a higher level of confidence in a user’s identity. But what about the other employee we met last time? “Greg” is constantly on the road as a sales executive. It’s impossible to use his location as a condition for allowing him access to resources, when he needs access from so many different places. In fact, there is no one static condition that can be applied in Greg’s case; his situation is dynamic, and the method of authentication he uses need to account for that. Enter dynamic identify confidence scoring – a method that uses AI and ML to build a range of confidence in the user’s identity by taking into account multiple factors such as location, device and session information, which together define normal user behavior. Greg has a pattern of behavior, just as Judy does – but it’s a different, more complex pattern that can’t be defined by location alone. 

It’s Your Authentication Journey. Which Way Should You Go Next? 

Advertisement. Scroll to continue reading.

For some organizations, conditional access makes sense as a next step in the authentication journey – at least for now. If you operate a call center that employs a full-time, on-site staff of people like Judy, it may be exactly what you need. But what happens if you decide to reduce infrastructure by having some staff work remotely? Or you begin to employ contract workers? As organizations grow and change, they often reach the point where it’s simply unsustainable to keep writing new policies for every specific situation. Your authentication strategy must evolve along with your business. Maybe you use conditional access for as long as it’s practical in your situation. Maybe you skip that approach altogether and move directly to dynamic identify confidence scoring. Maybe you find that a combination of several approaches works best for you. While there is no one-size-fits-all approach to authentication, the key is understanding the dynamics and diversity of your users, and finding the right method to address evolving needs.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...