Guarding The Door: The Dead Bolt Or The Porter?

August 27, 2016

In the physical world, we have long deployed the dead bolt as a means of access control. It has served us well for many years: it is a sturdy, resilient way to restrict access to a particular area that we deem sensitive. However, the dead bolt has a fatal flaw. It is accessed with a key. That key can be copied or stolen. The dead bolt can be accessed by anyone who holds the key, regardless of whether it is the real owner or not. In effect, a malicious actor with the key renders the dead bolt useless. A dead bolt can also be picked, or brute forced, by skilled enough hands.

In the logical world, the equivalent of the dead bolt is password based authentication. Like the dead bolt, the password has been a technology that has served us well for many years However, it shares the same fatal flaw as the dead bolt. A malicious actor who has stolen the password can use it to authenticate, even without being the true owner.

A better solution in the physical world would be having a dynamic protection mechanism guarding the door. An adaptive gatekeeper of sorts, much like a New York doorman or a porter. A porter recognizes you as you approach the building. A porter makes it easier for you: if he notices you are carrying groceries or a large delivery, he can unlock and open the door for you.The porter is part of the community, he knows when there is an active threat in the neighborhood. A porter can recognize your behavior, noticing that you are under duress or in need of assistance. He can call for help. The porter can improve your overall experience. The porter is adaptive intelligence at the front gate.

In the logical world, the equivalent of the porter is adaptive authentication. Adaptive authentication provides a means for recognizing you as you approach a resource that you wish to gain access to. The adaptive engine performs analysis on many different attributes of the way you present yourself to the resource. A risk profile is compiled from these attributes, and the adaptive engine makes a determination on whether to deny you access, or step-up your authentication to an additional second factor. Since much of the analysis is done behind the scenes, the technology can make it easier for you. It can authenticate you without the need for re-entering credentials.

Adaptive authentication can cross the divide between the physical and logical worlds. Like the porter, the adaptive engine can recognize changes in your physical behavior. When each of us interact with our desktops via the keyboard and mouse, we leave a recognizable signature behind. This signature is comprised of the timings in which we press, depress and move between keys. It is comprised of the way we accelerate, decelerate and click the mouse. When we interact with our mobile devices, our method of touching the screen and holding the device is unique to us. This technology is known as behavioral biometrics.

Behavioral biometrics is a technology that is ideally suited for logical access control. It is highly accurate, with successful match rates around 98%. One of its most advantageous aspects is that it can be collected behind the scenes, without interfering with the overall experience of the legitimate user. It can help to solve two very vital aspects of logical access control: elevation of trust, and continuous authentication. In the aspect of elevation of trust, it can help to raise the initial level of certainty that the user is actually who they claim to be. In the aspect of continous authentication, it can help to ensure that the level of certainty does not decay over time. Continuous authentication is key to battling the insider threat. Imagine the case of an employee leaving their terminal unlocked, and a malicious user sitting down to make use of it while the employee is authenticated. With continuous authentication, that malicious user could be stopped.

When evaluating all elements of risk around an authentication, the physical behavior of the user behind the credentials must be considered. Adaptive authentication and behavioral biometrics will prove to be a very powerful pairing of technologies. You want a dynamic, adaptive intelligence guarding you: one that evolves over time. The porter instead of the dead bolt.

  • SecureAuth

Ready for a Demo?

Eliminate identity-related breaches with SecureAuth!