Access Denied

This page requires users to be logged in and using a specific plan to access its content.

If you believe this is an error or need help, please contact
support@cybernewscentre.com


Login or Sign Up
⭠ Back
In a joint venture, CISA and the NSA released a report regarding the Enduring Security Framework (ESF), an initiative led by both CISA and NSA, which emphasises a cooperative approach between public and private sectors.
Copy Page Link
Mark De Boer
October 4, 2023

https://www.cybernewscentre.com/plus-content/content/future-proofing-authentication-a-cisa-nsa-perspective

You have viewed 0 of your 5 complimentary articles this month.
You have viewed all 5 of your 5 complimentary articles this month.
This content is only available to subscribers. Click here for non-subscriber content.
Sign up for free to access more articles and additional features.
Create your free account
follow this story

Strengthening Digital Gatekeepers: An In-depth IAM Analysis

Today, in a joint venture, CISA and the NSA released a report titled "Identity and Access Management: Developer and Vendor Challenges". This publication was crafted by the Enduring Security Framework (ESF), an initiative led by both CISA and NSA, which emphasises a cooperative approach between public and private sectors. ESF's mission is to counter threats that endanger national security and crucial infrastructure.

This new release is a follow-up to ESF's earlier publication which detailed best practices for Identity and Access Management (IAM) targeted at administrators. The current document delves into the challenges encountered by developers and tech producers regarding IAM. It particularly spotlights the technological barriers in implementing Multi-Factor Authentication (MFA) and Single Sign-On (SSO) systems effectively.

While its primary focus is on larger establishments, the advice contained can also benefit smaller entities. CISA urges all cybersecurity professionals to review this guidance and discuss its implementation with their respective software suppliers.

View or download PDFs below:

Executive Summary

User authentication in computing has traditionally been based on usernames and passwords. To enhance this, Multi-Factor Authentication (MFA) uses a combination of different evidence types during an authentication effort. These types encompass something you possess, something you're aware of, and something intrinsic to you. On the other hand, Single Sign-On (SSO) consolidates authentication and access management across varied systems and identity sources. When correctly used, it can boost the initial sign-in's security assurance and monitor the information relayed between systems concerning authentication and permission.

Building on ESF's prior work on IAM best practices, experts from both the government and private sectors reviewed the challenges developers and vendors face in relation to IAM. They recognized the need for a comprehensive approach to MFA and SSO as a significant obstacle due to the current tech constraints.

Effective IAM entails both the right technology and processes. For secure IAM functions, vendors must offer viable solutions. It's imperative for these solutions to be interoperable, as no single provider can cater to all of an organisation's IAM needs. Collaborative efforts are essential for fruitful, secure outcomes. Proper IAM tools should enable organisations to differentiate between genuine users and unauthorised intruders.

Given that cyber adversaries often masquerade as authentic users, it's critical to identify and respond swiftly to any suspicious activities. This report underscores the technological deficiencies related to MFA and SSO adoption. The aim is to encourage developers to enhance their existing tools and even craft new ones to address these issues. The document also touches upon non-technical challenges such as the financial aspects, manpower, and the overall user experience associated with these technologies.

Strengthening Digital Gatekeepers: An In-depth IAM Analysis

Today, in a joint venture, CISA and the NSA released a report titled "Identity and Access Management: Developer and Vendor Challenges". This publication was crafted by the Enduring Security Framework (ESF), an initiative led by both CISA and NSA, which emphasises a cooperative approach between public and private sectors. ESF's mission is to counter threats that endanger national security and crucial infrastructure.

This new release is a follow-up to ESF's earlier publication which detailed best practices for Identity and Access Management (IAM) targeted at administrators. The current document delves into the challenges encountered by developers and tech producers regarding IAM. It particularly spotlights the technological barriers in implementing Multi-Factor Authentication (MFA) and Single Sign-On (SSO) systems effectively.

Get access to more articles for free.
Create your free account
More Cyber News