Presentation is loading. Please wait.

Presentation is loading. Please wait.

Next Steps toward More Trustworthy Interfaces, continued Burt Kaliski, RSA Security 2 nd TIPPI Workshop June 19, 2006 Also includes presentations from.

Similar presentations


Presentation on theme: "Next Steps toward More Trustworthy Interfaces, continued Burt Kaliski, RSA Security 2 nd TIPPI Workshop June 19, 2006 Also includes presentations from."— Presentation transcript:

1 Next Steps toward More Trustworthy Interfaces, continued Burt Kaliski, RSA Security 2 nd TIPPI Workshop June 19, 2006 Also includes presentations from FSTC and W3C

2 Agenda Recent industry activities around user authentication How to get more trustworthy user interfaces Next steps

3 Recent Industry Activities A growing chorus (and calendar) … June 2005: 1 st TIPPI Workshop October 2005 – May 2006: FSTC Better Mutual Authentication project October 2005: FFIEC guidance on user authentication March 2006: W3C workshop on Web authentication June 2006: 2 nd TIPPI Workshop July 2006: Proposed IETF session on Web Authentication Resistant to Phishing (WARP)

4 FSTC Better Mutual Authentication Project The Financial Services Technology Consortium (FSTC) ran a project on Better Mutual Authentication (BMA) from October 2005 – May 2006 Dan Schutzer, executive director of FSTC, has summarized the findings in a presentation he prepared for this workshop: BMA Roadmap: A Summary of the BMA Findings FSTC is considering a second phase of the project

5 W3C Workshop on Web Authentication The World Wide Web Consortium (W3C) organized a workshop on Web authentication in March 2006 The team has summarized its work in another presentation prepared for this workshop: W3C Engagement in Web Security Follow-on work is also being considered in this organization

6 IETF Web Authentication Initiative Sam Hartman, co-Security Area director in the IETF, is proposing a new project on Web Authentication Resistant to Phishing (WARP) From his Internet-Draft at http://www.ietf.org/internet- drafts/draft-hartman-webauth-phishing-00.txt:http://www.ietf.org/internet- drafts/draft-hartman-webauth-phishing-00.txt “This memo proposes requirements for protocols between web identity providers and users … Websites must never receive information such as passwords that can be used to impersonate the user to third parties. Browsers should perform mutual authentication and flag situations when the target website is not authorized to accept the identity being offered …” Session proposed for July 2006 IETF meeting

7 FFIEC Guidance The Federal Financial Institutions Examination Council (FFIEC) in October 2005 issued general guidance that banks should employ more than “single-factor authentication” for high-risk transactions Quoting from the guidance at http://www.ffiec.gov/pdf/authentication_guidance.pdf: http://www.ffiec.gov/pdf/authentication_guidance.pdf “… Where risk assessments indicate that the use of single-factor authentication is inadequate, financial institutions should implement multifactor authentication, layered security, or other controls reasonably calculated to mitigate those risks.” Guidance is not technology-specific; organizations are expected to comply by end of 2006

8 How to Get More Trustworthy Interfaces An authentication agent observes what the application and user are doing and protects the user —e.g., PwdHash An authentication service also responds to (authorized) requests by an application Proposal: Establish a trustworthy user authentication service as the primary interface between the user and applications w.r.t. user authentication —Trustworthy = User has assurance that (a) this service is interacting with user (b) on behalf of an authorized resource minimum: authentication data are protected from misuse

9 How to Get There Architecture: —Where should it go? —What should it do? Standards: —How do you use it? service interfaces, e.g., “Run authentication mechanism” authentication mechanism types: “username/password,” “OTP token,” “PKI token”, etc. Requirements and use cases Analogy: Media players

10 User Authentication Architecture Today browserVPNother apps. user interface device interfaces credential store generic operating system services PC or mobile phone

11 User Authentication Architecture Today browserVPNother apps. user interface device interfaces credential store PKCS #11, CAPI PC or mobile phone

12 A Better Architecture for User Authentication browserVPNother apps. user interface device interfaces credential store trustworthy user authentication service PC or mobile phone

13 In Conclusion Industry should standardize on a single authentication mechanism Industry should support multiple authentication mechanisms, but standardize on the user interface Industry should support multiple authentication mechanisms and user interfaces, and standardize on the service interface Result: A platform for innovation in trustworthy interfaces for user authentication, and better security  

14 Next Steps for TIPPI Proponents 1. Continue to advance trustworthy interface concepts within the various industry initiatives 2. Collaborate on architecture and standards proposals 3. Contribute to the 3 rd TIPPI Workshop next June!

15 Contact Information Burt Kaliski Vice President of Research, RSA Security Chief Scientist, RSA Laboratories bkaliski@rsasecurity.com http://www.rsasecurity.com/rsalabs bkaliski@rsasecurity.com http://www.rsasecurity.com/rsalabs

16 Additional Presentations BMA Roadmap: A Summary of the BMA Findings W3C Engagement in Web Security

17 FINANCIAL SERVICES TECHNOLOGY CONSORTIUM Copyright © 2006 Financial Services Technology Consortium—All rights reserved BMA Roadmap: A Summary of the BMA Findings Daniel Schutzer, Executive Director FSTC

18 FINANCIAL SERVICES TECHNOLOGY CONSORTIUM Summary: Key Themes  Mutual authentication is vital A necessary first step to improving online safety The best way to improve customer confidence in the online channel  Mutual authentication is strategic Not just a technology or operational play Understand you own posture with regard to risk, operational outsourcing, cooperation with other FIs  The consumer/customer is the main story Consumer fears drive regulatory pressure Consumer confidence essential for success of online channel Consumer convenience drives or inhibits adoption of new solutions Customer support costs are significant now and in the future

19 FINANCIAL SERVICES TECHNOLOGY CONSORTIUM Talking to consumers about authentication  “You need better security for online financial services” “Why? I’m not liable!” “You mean this online stuff isn’t safe enough already?” “Fine, as long as it doesn’t cost me anything and is just as convenient”  “We’re changing our approach to online security” “Are you really my FI? Your message sounds like a phishing scam to me” “What was wrong with the old way?” “I just want to get to my account—why are you making me jump through all these hoops?” “Is this because of the latest merger? You’ve already messed up my old services and made me change things”  “Here’s your new secure authentication device.” “What am I supposed to do with it?” “What does this do for me?” “What if I don’t want to use it?” “No way—have you seen what I already have to carry around?” “I already have a handful of these things—can’t I just use one I’ve already got?” “But I need one for my computer at the office” “This is more of a hassle than it used to be—can I go back to the old way?”

20 FINANCIAL SERVICES TECHNOLOGY CONSORTIUM N EW S Four Directions to Approach Authentication Electronic Credentials Alternative Channels Shared Secrets Contextual Analysis

21 FINANCIAL SERVICES TECHNOLOGY CONSORTIUM Authentication challenges associated with delegation of authority  Informal delegation of authority by retail customers (e.g., sharing passwords or auth devices) leads to a variety of exposures FIs cannot distinguish the principal customer from a delegate All-or-nothing access for delegates—i.e., customer can’t restrict what their delegate can do via online services Rescinding authority granted to a delegate is difficult In the real world, fraud by “friends and family” is a significant problem  Delegation of authority to third party services presents other challenges Introducing new authentication measures can “break” legitimate access by third party financial services Some existing access by third party services may represent compliance challenges with current regulatory guidance  Sharing of authentication mechanisms across multiple FIs can significantly increase exposures when customers delegate authority to others

22 FINANCIAL SERVICES TECHNOLOGY CONSORTIUM Near-term steps for the vendor community  Incorporate mutual authentication into products and services Wherever possible, provide options to support two-way authentication Where not possible, integrate products or services into solutions that facilitate mutual authentication  Improve interoperability of products and services Authentication techniques and devices that interoperate with standard services Services that support various authentication techniques and devices Adopt standards that facilitate interoperability  Introduce services that integrate multiple authentication techniques into comprehensive solutions  Address customer support for the consumer population at large  For vendors of OSs, browsers, and other Internet applications Overhaul and substantially improve usability of security measures at all levels Simplify security configuration management for end users Substantially improve security of computing platforms used by consumers

23

24

25

26

27

28


Download ppt "Next Steps toward More Trustworthy Interfaces, continued Burt Kaliski, RSA Security 2 nd TIPPI Workshop June 19, 2006 Also includes presentations from."

Similar presentations


Ads by Google