Passwordless - The Future of Authentication
Mahesh Channapatna Girish
Senior Consultant - Information Security | Data Privacy | CIPM | CISA | CEH v11 | CCNA |
Security & Usability for the Digital Transformation
Companies are going through a #digitaltransformation, or modernization, to stay competitive and meet user expectations. They are migrating from legacy systems to the cloud, resulting in hybrid environments. Customers are driving the push toward usable, mobile technology and always-on, always-available #cloud web-based applications. This move to the cloud includes both customers and all types of enterprise users—including employees, contractors, vendors, partners, and more. This shift to a decentralized identity-centric operational model has placed increased importance on ensuring secure access for users. The future of #authentication demands both a secure and usable method of authorizing users to both cloud and on-premises systems.
The Shift in Authentication to Passwordless
#Passwords were introduced in the mid-1960s by the Compatible Time-Sharing System (CTSS) at the Massachusetts Institute of Technology (MIT), according to Computer History and Wired. They were developed as an accounting tools to allow users access to their specific resources for a certain amount of time. As time went on, some users shared passwords and others demanded better security, and the emphasis shifted to authentication. In the 1980s, Security Dynamics Technologies patented a “method and apparatus for positively identifying an individual” and paved the way for additional authentication factors—like multi-factor authentication (MFA), which has matured in recent years as a secondary layer of security for primary password authentication.
The primary authentication method, via password, and the secondary authentication method, via MFA, became increasingly important as password theft and data dumps became routine. The 60-year-old single-factor password has failed to stand the test of time. In 2019, an anonymous creator released 2.2 billion usernames and passwords freely across attacker forums—the largest collection of breaches yet (Wired). Advances in secondary factors, from the proliferation of smartphones to the consumerization of biometrics, have led many to question whether a password is even necessary for strong authentication. If strong authentication is based on multiple factors, and passwords are the most vulnerable factor, why even require them? This realization has led the industry to move toward replacing passwords altogether with more secure and simplified methods of authentication.
“Passwords have multiple weaknesses that attackers can exploit. Even the best password policy cannot mitigate spyware or phishing attacks.”
The Problem with Passwords
Passwords are subject to several problems that make them an insecure factor for identity verification. Additionally, passwords cause a lot of user friction and frustration.
They take up a lot of help desk support time each year—so much so, that many large U.S.-based organizations have allocated over $1 million annually for password-related support costs, according to Forrester. Gartner notes that “passwords remain a significant source of risk for organizations—even when incorporated with another method for MFA (multi-factor authentication) —and of friction, frustration, and fatigue for users and #administrators” in its Market Guide for User Authentication. A single organization spent $30 per employee case on expired password cases alone, totaling over $500,000 in support costs and lost productivity every year.
A survey of 200 IT security leaders conducted by International Data Group (IDG), sponsored by MobileIron, found that 62 percent of respondents reported extreme user frustration at password lockouts. This isn’t surprising – lockouts pause productivity and contributes to poor user login experiences. In addition to password lockouts, the number of cloud services used by enterprises today has increased dramatically over time; today, the average enterprise uses 1,400 different cloud services, while the average business user must log in with as many as 190 passwords, according to Sky-high #Networks and Security Magazine.
领英推荐
It can be subverted by #attackers, who use them as part of a larger attack. A few examples include credential stuffing (large-scale, automated login attempts using stolen credentials); phishing (an attempt to deceive users and illegally acquire sensitive information, like passwords); brute-force attacks (password guessing); etc. Weak passwords are easy for adversaries to crack or guess. Due to password fatigue, users often choose weak passwords or reuse old passwords for different accounts. As a result, over 80 percent of breaches involving web applications are attributed to the use of stolen #credentials, while 50 percent of all breaches involved stolen credentials, according to Verizon's 2022 Data Breach Investigations Report.
What is Passwordless Authentication?
#passwordlessauthentication establishes a strong assurance of a user's identity without relying on passwords, allowing users to authenticate using biometrics, security keys, or a mobile device. This eliminates the need for users to remember passwords, allowing for a frictionless login experience while reducing administrative burdens and overall security risks for the enterprise.
Business Benefits of Passwordless
Passwordless authentication provides a single, strong #assurance of users' identities in order to achieve user trust. As a result, enterprises can realize the following benefits:
THE CHALLENGE: A Nascent Market
Today, many vendors offer passwordless authentication solutions that are tailored to specific use cases, such as eliminating passwords required for #SSO. However, these piecemeal approaches offer limited benefits and do not solve the inherent security weaknesses of passwords. Modern enterprises require a comprehensive passwordless solution that covers every authentication flow and assesses the posture of devices accessing without a password. Such a solution must also address business challenges, including:
THE SOLUTION: Path to Passwordless