Today we’re continuing our series on the KuppingerCole Leadership Compass for Adaptive Authentication 2018 report. So far we’ve talked about the benefits of adaptive authentication and how to best evaluate solutions. Today, however, our focus is how an adaptive authentication engine works during an actual attack.
If you’re an experienced security practitioner, you know that even the best preventive measures can’t stop every attack. Criminals are tenacious and some of them will eventually penetrate your organization. Are perimeter protections still valuable? Absolutely. Stopping an attack already in progress involves proactive monitoring, incident response, forensic analysis and remediation. Only then can you stop attackers before they do serious harm.
Consider a typical attack where the bad actor is using phishing. Using social engineering, the carefully crafted phishing message is designed to trick users into giving up credentials or to download malware onto their computers. These attacks only need to succeed once. Once the attacker has gained a foothold, their first step is to expand their freedom to move around inside your network. A common objective is to obtain additional valid credentials; they may even surreptitiously enroll in your two-factor authentication (2FA) system with accounts or devices they can access.
At this point, the attacker has bought themselves time to locate and steal their target information, whether it’s employee social security numbers, intellectual property, payment card data, or something else. Mandiant’s 2018 threat report says bad actors stay in your systems for an average of 101 days. This points to additional security measures being required to detect intrusions and stop attackers’ progress.
It’s also where adaptive authentication comes into play, by helping you to distinguish between legitimate and fraudulent users.
Stopping an attack in progress
Once an attacker has acquired valid credentials to log in and out of your system, often using a VPN, they may seem to have the keys to the kingdom. However, multi-factor authentication can thwart them in several ways. Hardware tokens or biometrics such as fingerprint are almost impossible for attackers to provide, restricting their access. Adaptive authentication helps you determine whether or not extra authentication steps are needed and if the user can proceed. As we’ve discussed elsewhere, these techniques can analyze risk based on:
- Location. If the user is based in Russia or China, where your company has no employees, why are they using employee credentials to log in?
- IP address. An adaptive authentication engine can detect an anonymous proxy like a Tor exit node, and compare the user’s IP address against a white list of trusted addresses or a black list of suspicious or malicious addresses.
- Account type. Different account types will have different levels of access, privileges and duties. You can assign different policies to sensitive accounts, and alert on violations to watch for atypical behavior.
- Device characteristics. If a user logs in from a new device or server, adaptive authentication can read and compare those device attributes, and potentially step up authentication requirements.
- Behaviors. Attackers can indicate malicious behavior in a number of ways, such as using credentials to log in from the other side of the world after the real user logged in just hours earlier, or suddenly accessing the network during strange hours.
By creating risk profiles that connect to authentication policies, you can automate actions for specific behaviors and findings. Those actions could include requiring a password reset, the completion of an MFA step, or denying access entirely.
In a world where skilled attackers access networks every day, adaptive authentication can be profoundly useful. Automation reduces human error, provides a smoother experience for legitimate users and can stop attackers without waiting for intervention. Through sophisticated analysis and intelligent authentication decisions, adaptive authentication is your best bet to halt even the most cunning malicious actors.
Watch recent KuppingCole’s webinar
If you want more details on how adaptive authentication can strengthen your security, consider watching a replay of last week’s webinar with John Tolbert of KuppingerCole titled “Mitigate Identity-Related Breaches in the Era of Digital Transformation.”