risk appropriate authentication external

26
risk-appropriate authentication – a vision of tomorrow Per Hägerö CTO

Upload: hagero

Post on 02-Jul-2015

930 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Risk Appropriate Authentication External

risk-appropriate authentication – a vision of tomorrow

Per Hägerö

CTO

Page 2: Risk Appropriate Authentication External

risk-appropriate authentication?

1

Page 3: Risk Appropriate Authentication External

2

Page 4: Risk Appropriate Authentication External

3

Page 5: Risk Appropriate Authentication External

What are your options?

4

KBA: Lexical

KBA: Graphical

Token: OTP

Token: PKI

Token: OOB

Biometrics: Biological

Biometrics: Behavioral

Something only you know (hopefully) Something you hold

Something your are

Page 6: Risk Appropriate Authentication External

Risk levels (NIST SP 800-63-1)

5

Minimal

High

Medium

Low

Page 7: Risk Appropriate Authentication External

Risk levels (NIST SP 800-63-1)

6

Minimal

High

Medium

Low

Lexi

cal

OTP

PK

I

OO

B

Page 8: Risk Appropriate Authentication External

is it that easy?

7

Page 9: Risk Appropriate Authentication External

NO! 8

Page 10: Risk Appropriate Authentication External

There are a number of needs and constraints you need to consider  Who are you authenticating?  Where are they?  What will they use it for?  What end-points are they using?  Are there any regulations?  What is the available budget?  What is the risk?  Others?

9

Page 11: Risk Appropriate Authentication External

all set?

10

Page 12: Risk Appropriate Authentication External

not yet…

11

Page 13: Risk Appropriate Authentication External

consider the aspect of identity proofing

12

Page 14: Risk Appropriate Authentication External

≤ 100 %

13

Page 15: Risk Appropriate Authentication External

14

IDE

NTI

TY P

RO

OFI

NG

AUTHENTICATION

Page 16: Risk Appropriate Authentication External

15

IDE

NTI

TY P

RO

OFI

NG

AUTHENTICATION

Page 17: Risk Appropriate Authentication External

16

IDE

NTI

TY P

RO

OFI

NG

AUTHENTICATION

IDENTITY ASSURANCE

Page 18: Risk Appropriate Authentication External

17

Assurance

Ease-of-use Adjacent needs

TCO

Considerations

Page 19: Risk Appropriate Authentication External

18

Page 20: Risk Appropriate Authentication External

19

trends

Page 21: Risk Appropriate Authentication External

20

ease of use

Page 22: Risk Appropriate Authentication External

21

less is more

Page 23: Risk Appropriate Authentication External

22

user centric

Page 24: Risk Appropriate Authentication External

23

authenticate once

Page 25: Risk Appropriate Authentication External

24

layered approach

Page 26: Risk Appropriate Authentication External

PRESENTATION TITLE

25

Whats up at Nexus Labs?