Insight By Duo Security

Authentication and authorization both due for major upgrade

Given the edgeless nature of modern networks, and the need to limit trust and access of both external and internal users, more and more IT leaders are recognizi...

Large organizations concerned with cybersecurity – and that’s all large organizations – are searching for and experimenting with options for user authentication and access. Specifically they’d like to get past the not-so-trusty password. The Defense Department has the additional goal of replacing the venerable common access card (CAC).

It’s not that the CAC doesn’t work. But it’s cumbersome and requires a lot of administration. More importantly, it inhibits mobile computing and use of cloud computing, two developments that both enable modern applications and infrastructure, and require up-to-date authentication and access techniques. Given the edgeless nature of modern networks, and the need to limit trust and access of both external and internal users, more and more IT leaders are recognizing the need to replace yesterday’s authentication and access.

Shape

The Case for Updating Authentication

Our users have increased expectations [for] better accessibility to their data, to their applications, and enhanced mobility for that access. And our cyber threats have not decreased. So today we have to take a more holistic strategy, to have an intentional purpose, that we are addressing these needs.

Shape

Distinct and Discreet Technologies

We have to make the security more transparent for the end user. If we make it difficult, they will inevitably find a way to get their jobs done regardless of what we do. We have to get more comfortable with technologies like FIDO [fast ID online]…and also to work with the cloud providers and how they’re deploying Secure Assertion Markup Language and OpenID.

Shape

Multi-Factor Authentication

We’re carrying around in our pocket these devices showing that at scale, some of these technologies work really well. So having that extra [authentication] factor is really important. CAC was two-factor, but sometimes depending on the platform was not exactly two-factor. So you might need something a little stronger that layers on top of that. Hardware tokens are useful at a higher authentication level or authorization level, but something as easy as push technology can be used for a lot of cases.

Listen to the full show: 

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Related Stories

    GettyImages-1710421116Visual representation of cloud computing.

    FEMA’s cloud journey hitting uphill portion of marathon

    Read more
    military construction

    Air Force investing in privatized housing, lawmakers are not sold on the idea

    Read more
    Amelia Brust/Federal News Network

    Biden Administration tweaks regulations for how states, cities can use federal funding

    Read more

Panel of experts

  • Tom Temin

    Federal News Radio

  • Ron Bewtra

    Chief Technology Officer, Department of Justice

  • Greg Crabb

    Vice President and CISO, U.S. Postal Service

  • Steve Wallace

    Technical Director, Development and Business Center, Defense Information Systems Agency

  • Sean Frazier

    Advisory CISO, Federal, Duo Security

  • Paul Grassi

    Partner and SVP, Cybersecurity, Easy Dynamics Corp.