How to Implement Strong Security Policies in

Transcription

How to Implement Strong Security Policies in
How to Implement Strong Security Policies in
Ways that Users Rapidly Embrace
$OLJQLQJ8VHUV¶'HVLUHIRU&RQYHQLHQFHZLWK&RUSRUDWH'HPDQGV
for Security through Fingerprint Biometrics
A DigitalPersona White Paper
April 2008
Human Element Biometrics, LLC
Oklahoma City, OK USA
T : +1 405.858.8632
Tel
Fax: +1 405.858.8641
F
E-Mail: info@hebiometrics.
f
com
W : www.hebiometrics.com
Web
Table of Contents
Introduction .............................................................................................................................................................. 1
The Problem ............................................................................................................................................................ 1
The Weakest Link: Simple Passwords .................................................................................................................... 1
People are Fallible and Predictable ..................................................................................................................... 1
Alternatives to Simple Passwords ........................................................................................................................... 2
Tokens and Smart Cards ..................................................................................................................................... 2
Single Sign-On ..................................................................................................................................................... 2
Stricter Password Policies ................................................................................................................................... 3
Password Self-Reset ........................................................................................................................................... 3
The Cost to Organizations ....................................................................................................................................... 3
User Productivity and Support Costs ................................................................................................................... 3
Compliance .......................................................................................................................................................... 4
Fingerprint Authentication: Enabling Strong Security that Users Embrace ............................................................ 4
Users Enjoy Fingerprints ± and Rapidly Adopt .................................................................................................... 4
Fingerprints Address IT and Executive Needs .................................................................................................... 5
Balancing Security, Convenience and Cost ........................................................................................................ 5
+RZ'LJLWDO3HUVRQD¶V)LQJHUSULQW7HFKQRORJ\:RUNV ............................................................................................. 5
Result: Strong Security with Fast ROI ..................................................................................................................... 6
Summary ................................................................................................................................................................. 6
About DigitalPersona
DigitalPersona is the leading provider of fingerprint authentication solutions for enterprise networks, developers
and consumer OEMs. Founded in 1996, the company designs, manufactures and sells flexible solutions that
make it possible for businesses to implement strong security policies in ways that users rapidly embrace.
%XVLQHVVXVHUVDQGFRQVXPHUVDOLNHHQMR\'LJLWDO3HUVRQD¶VVRIWZDUHEHFDXVHLWHOLPLQDWHVWKHSDLQRI
remembering and typing passwords or dealing with tokens and cards ± making the Internet, applications and
computers more convenient.
,7RUJDQL]DWLRQVDSSUHFLDWHKRZ'LJLWDO3HUVRQD¶VFHQWUDOL]HGmanagement, per-user uniqueness and rapid user
acceptance simplifies data-loss prevention and compliance efforts with strong passwords, multi-factor
authentication and transaction accountability.
'LJLWDO3HUVRQD¶VDZDUG-winning technology is used worldwide by over 90 million people in the most diverse and
FKDOOHQJLQJHQYLURQPHQWV7KHFRPSDQ\¶VLQWHURSHUDEOHELRPHWULFVRIWZDUHVROXWLRQVXQLTXHO\VXSSRUWWKH
industry's widest array of notebooks with fingerprint readers in addition to its own line of optical placement
reader peripherals. For more information contact DigitalPersona, Inc. at +1 650.474.4000, or visit
www.digitalpersona.com.
© 2008 DigitalPersona Inc. All rights reserved. DigitalPersona is a trademark of DigitalPersona, Inc., registered in the United States and
other countries. All other trademarks referenced herein are the property of their respective owners.
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
ii
Introduction
The Problem
Securing access to computer systems and data is
one of the key challenges facing organizations
today. The need to safeguard these assets from
both internal and external threats has never been
more urgent. Within a six month period, The
Computer Emergency Response Team (CERT)
1
reported over 70,000 security incidents.
Most authentication solutions typically suffer from
the following problems:
'RQ¶WHQVXUHLQGLYLGXDODFFRXQWDELOLW\
compliance ± passwords, tokens and cards
can be lost, stolen or shared, limiting their
effectiveness in identifying user actions.
Are too slow or bulky for individual
transactions ± products that are timeconsuming or physically inconvenient deter
usage, making them impractical for securing
low-level transactions.
The average (computer security incident) loss
per a respondent to our survey was $345,005 up
from $167,713 reported last year (2006).
Force choice of security over convenience ±
passwords that are strong enough to be secure
JHWZULWWHQRQ³VWLFN\QRWHV´while cards and
tokens have to be kept accessible.
2007 CSI Computer Crime & Security Survey
Authentication is essential to protecting your
network and data, achieving compliance and
satisfying auditors. But most authentication systems
have a major flaw: they FDQ¶WWHOO\RXIRUVXUHwho
was authenticated. Passwords, tokens, cards and
PINs all can easily be shared. Biometrics, on the
other hand, let organizations know with certainty
who accessed what and when. By linking identity to
specific actions, biometrics provides a robust
foundation for secure authentication.
Fingerprint authentication, in particular, enables IT
organizations to more easily address corporate
security needs by exploiting XVHUV¶LQVDWLDEOHGesire
for convenience. Users enjoy not having to
remember or type passwords and happily embrace
fingerprint systems. This makes it possible for IT to
implement compliance-mandated security policies
in ways that are rapidly adopted.
Fingerprints provide a natural interface for:
Drive up operational costs ± helpdesks get
burdened by password resets, token or card
inventorying and re-provisioning.
Can lock customers into a single vendor ±
creating applications that handle different
YHQGRUV¶DXWKHQWLFDWLRQKDUGZDUHFDQEHYHU\
difficult, limiting choices of platforms.
The Weakest Link: Simple Passwords
Passwords are the most pervasive mechanism
used to secure access to networks and databases.
Auditors now routinely insist that organizations
prove that they are taking steps to ensure that
passwords are used effectively. Unfortunately,
password authentication is often the weakest link in
the security infrastructure.
Strong Passwords ± Users no longer care
how complicated passwords are or how often
WKH\¶UH changed.
According to the Computer Emergency Response
2
Team (CERT), 80% of the security attacks they
investigate are password-related.
Multi-factor Authentication ± )LQJHUVFDQ¶WEH
forgotten, lost or stolen.
People are Fallible and Predictable
Transactional-level Accountability ±
Fingerprints can be used almost
instantaneously without special effort, making
them part of the normal routine when accessing
applications.
Despite countless hours spent creating policies,
designing procedures and purchasing safeguards, a
single user can undo all of ,7¶VHIIRUWVE\VLPSO\
sharing a password. 8VHUVDUHQ¶WSHUIHFWDQG
typically are more concerned with getting their jobs
done than in following complex policies. As a result,
2
1
RED HERRING³7KH*OREDO6HFXULW\*DS´
11/5/03. www.redherring.com
®
CERT Coordination Center (CERT/CC) is a
center of Internet security expertise, located at the
Software Engineering Institute, a federally funded
research and development center operated by
Carnegie Mellon University.
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
1
the human element often results in a number of
common password problems:
Too many passwords to remember: IDG
(International Data Group) found that the average
user in a 10,000-employee organization has 14
separate passwords.
Weak passwords: Users tend to set passwords
based on words that they can remember easily,
making them easy for hackers to guess. According
to the NTA 0RQLWRU¶V research, 84% of users
consider memorability as the most important
attribute of a password, with 81% selecting a
3
common word as a result. Simple password
cracking programs can find many whole word
passwords quickly. One FBI computer consultant,
who was frustrated by bureaucratic delays in
obtaining legitimate access to certain files, broke
LQWRWKHILOHVYLDWKH)%,'LUHFWRU¶VVHFUHWSDVVZRUG.
The consultant figured out the password using
4
software found on the Internet.
Single passwords for many systems: Users may
use the same work password for insecure sites
where passwords may be sent in clear text. A single
password, once cracked, may open many doors.
Accessible passwords: The NTA Monitor Password
Survey found that 49% write their passwords down
or store them in a file on their PC or Blackberry,
making the passwords accessible.
Accommodating or gullible employees: Passwords
are often subject to social engineering attacks.
frightening thought, but your information systems
are only as secure as your least responsible user.
³7KHELJJHVWWKUHDWWRWKHVHcurity of a company is
not a computer virus, an unpatched hole in a key
SURJUDPRUDEDGO\LQVWDOOHGILUHZDOO«7KHZHDNHVW
OLQNLQWKHFKDLQLVWKHSHRSOH´
Kevin Mitnick, Oct. 2002, BBC Interview
Alternatives to Simple Passwords
Since standard password practices do not provide
sufficient security for many organizations, a number
of alternatives have surfaced.
Tokens and Smart Cards
Strong authentication solutions typically use a token
or smart card in addition to a one time password to
authenticate users. Increasing the number of
required credentials (two-factor authentication) is a
broadly accepted method of increasing security.
Unfortunately, tokens and smart cards can¶t indicate
who is actually using them. In addition, they can be
shared, lost or stolen, limiting their effectiveness in
truly identifying user actions. Some authentication
solutions also require significant effort to work with
certain enterprise applications and lack the ability to
tightly integrate into existing network directories and
management infrastructure.
In one example, two-thirds of workers polled in
downtown San Francisco turned over their
passwords without hesitation when asked. Their
reward? A coffee coupon for $3. Of those who said
³QRZD\´WRWKHUHTXHVW, 70% still gave up hints, like
DQQLYHUVDU\GDWHZLIH¶Vor pet name. In addition,
79% said they use the same password for multiple
5
Web sites and applications. In another study, four
out of five workers would disclose their passwords
6
to someone in the company if asked.
These solutions typically require the setting up and
maintaining of a private key infrastructure (PKI),
increasing upfront and ongoing costs. Users often
forget the devices or leave them at their desk,
preventing access. As a result, deployments of
tokens and smart cards are often limited to
situations where the added security can justify the
higher cost to the organization and burden on the
user, principally remote access via VPNs.
A compromised password functions much like a key
to a lock; anyone who has it can get in. If you are
relying on only user ID and passwords for security,
there is no way to know for sure that the user was
even present at the time of authentication. It's a
Single Sign-On
3
NTA Monitor Survey, 2002
4
San Jose Mercury News, 8/28/06
5
San Jose Mercury News, 5/6/05
6
CNET News, 5/22/02
Single Sign-On (SSO) products simplify the
management of password credentials by allowing a
single password to provide access to all
applications. In theory, this eliminates the
management of all password credentials, except for
one, and gives the user free access to all
applications with only one logon.
In reality, several drawbacks limit the viability of
SSO for many companies. Most SSO solutions
require an administrator or programmer to perform
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
2
complex scripting for each supported application.
This work is often repeated whenever applications
are updated and their logon screens change.
Furthermore, many security experts consider SSO
less secure than using separate passwords. SSO
still relies on the end-users to create and maintain a
secure password, and only one password is
requiUHGWRDFFHVVDOORIWKHXVHUV¶DFFRXQWV
VRPHWLPHVFDOOHG³6LQJOH%UHDN-,Q´ In the end,
the high cost of ownership and continued reliance
on an end-user to securely manage a password can
limit the viability to all but a few organizations.
Stricter Password Policies
Some improvements have been made to the
traditional process of providing a username and
password, such as requiring "stronger" passwords.
But, the fundamental approach has not changed. Its
weaknesses are well known and are the primary
methods by which network security is
compromised.
Unfortunately, requiring frequently-changing,
complex passwords tends to backfire. People who
FDQ¶WUHPHPEHUWKHQHZSDVVZRUGVDUHHYHQPRUH
apt to write them down. Password security policies
rely on end-user cooperation, and strict policies
motivate users to compromise security. Those who
comply will generate higher support costs due to
IRUJRWWHQSDVVZRUGV,W¶VDFDWFK-22, with stricter
policies actually lowering overall security.
projects to integrate them with each application.
And, while they do significantly reduce helpdesk
costs associated with forgotten passwords, enduser productivity is still impacted as they must
perform the password reset.
The Cost to Organizations
Most users try to properly manage their identity
credentials by creating secure passwords and
hiding passwords or tokens from others. These
conscientious users often still forget their password
or token, generating a support call.
User Productivity and Support Costs
Helpdesk Password Costs
Between 25 to 40% of all help desk calls are
for password problems. Forrester
Average cost of a password reset call is
between $10 and $31. Forrester
Each year companies spend up to $150 per
user trying to maintain secure passwords.
Gartner Group
In many cases, the actual cost of a password reset
goes beyond the support costs:
For example, Mountain America Credit Union used
to require employees to lock their PC when they
stepped away. Multiple passwords were required to
unlock their computer and gain access. These
passwords led to staff documenting passwords on
®
Post-it notes or sharing them among co-workers.
However, after the company deployed a fingerprint
solution that replaced the typing of passwords with
a simple touch, the sticky notes disappeared, and
password reset calls to the helpdesk stopped.
Users also UHVSRQGHGSRVLWLYHO\WRWKH³FRRO´IDFWRU
in using fingerprints for authentication.
Loss of employee productivity and
effectiveness: (PSOR\HHVZKRFDQ¶WORJ in are
often idle until support is able to help them.
Impacts mission critical operations: In hospitals
where medical records must be quickly
accessed from a VKDUHG3&DWDQXUVHV¶
station, signing out another user before signing
in as an authorized user delays medical
treatment.
Impacts service: Call centers or any customerfacing operation where employees repeatedly
log in and log out of various applications while
customers wait decreases the number of
customers being served.
Password Self-Reset
Password self-reset solutions are intended to
reduce helpdesk calls about forgotten passwords by
allowing users to reset their own passwords.
However, such products do not address the source
of the security problem; end-users still must create
and manage a number of secure passwords.
In addition, password self-reset solutions are not
turn key and often require professional service
In California Commerce (Citicorp) BanN¶VFDOO
center, employees need to quickly access multiple
databases and accounts, all of which use different,
frequently changing passwords. Switching between
databases requires signing out of one program to
access the next. One forgotten password seriously
impacts the banking workflow. By using fingerprints
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
3
for secure authentication, CCB employees can now
quickly access information, improve service levels
and eliminate password reset calls.
Compliance
Almost all organizations are subject to some
regulatory or corporate mandates that require data
to be secured. Failure to comply with these
regulations can result in significant financial and
legal consequences:
The Sarbanes-Oxley (SOX) Act of 2002
requires high security standards for data that is
financial or confidential. Any public company
may be liable if it has not taken adequate steps
to protect this type of data. Many existing
password and security policies would not be
considered sufficient under SOX.
The Health Insurance Portability and
Accountability Act (HIPAA) mandates that
individually-identifiable health information must
be kept private and secure. HIPAA affects
virtually all healthcare-related information
created or received in virtually any medium by
the healthcare industry or an employer (Human
Resources). Password costs are not limited to
maintaining passwords, but also include the
potential $250,000 fine or imprisonment of up to
10 years or both, for wrongful disclosure with
intent to sell information.
Payment Card Industry Data Security Standards
(PCI DSS) is a multifaceted security standard
that requires security management, policies,
procedures, network architecture, software
design and other critical protective measures.
Data Breach Security Laws requires the
individuals be notified if their confidential or
personal data has been lost, stolen or
compromised. As of 2007, more than 35 U.S.
states have enacted these laws.
Financial Risk for Public Data Loss:
8% decline in the market value
8% loss in customers
Institutions are required to demonstrate that access
to private data is secured and provide an auditable
trail showing who signed into which application and
when. The costs of a disclosed data loss can be
significant, including damage to reputation, lower
stock value, and administrative expenses.
In March of 2008, Maine-based Hannaford Brothers
grocery chain announced that 4.2 million customer
card transactions were compromised. More than
1,800 of those credit card numbers have already
been used for fraudulent transactions. Within two
days of the breach announcement, customers filed
two class action lawsuits against the retailer.
Despite being PCI-certified in February of 2008, the
suits charge Hannaford was negligent for failing to
7
provide adequate security for computer data.
Fingerprint Authentication: Enabling
Strong Security that Users Embrace
Fingerprint authentication avoids many of the
security issues identified above. Unlike other
authentication methods, fingerprints are based on a
physical characteristic: who you are, not what you
know. Users simply touch their finger to the reader
and are immediately authorized and logged into the
network, application or Web site. Biometrics
enables administrators to know for sure that the
authorized user was present when signing in.
Users Enjoy Fingerprints ± and Rapidly Adopt
Fingerprints take the pain out of using
passwords. Fingerprints eliminate the need to
remember or type login IDs or passwords, making
even the most complex passwords easy to use. As
a result, security doesn't depend on human effort.
People can't "forget" their fingerprints ±
eliminating a common source of helpdesk calls.
Users find biometric technologies convenient
because they use a physical characteristic instead
of something to be remembered or carried around.
Fingerprints protect users. When fingerprints are
used with specific transactions, users can be
credited more accurately with what they do and can
DYRLGEHLQJDFFXVHGRIDFWLRQVWKH\GLGQ¶WSHUIRrm.
Temporary decline in revenue of 8%
Costs of litigation, notification, settlements.
IT Compliance Group, July 2007
7
www.bankinfosecurity.com, April 4, 2008
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
4
Fingerprints Address IT and Executive Needs
Make strong password and two-factor policies
feasible and easy for users. Fingerprints are fast,
instinctively easy and make life easier for users,
leading to rapid adoption. By using fingerprints, IT
organizations can H[SORLWXVHUV¶QDWXUDOEHKDYLRUVWR
drive corporate security goals.
Get auditors off your back: link actual people to
specific actions with complete nonrepudiation ±
Authenticating with a fingerprint tells you exactly
who does what, where and when. Fingerprints are
fast, so they can be used for each transaction, not
just securing each session. In addition, fingerprint
authentication creates an irrefutable audit trail
linking specific people to each action.
Deter Fraud ± people intuitively understand that
their fingerprint represents them, and only them,
reducing the likelihood that policies will be violated.
Balancing Security, Convenience and Cost
Regardless of how secure a technology promises to
EHLILW¶VKDUGWRXVHRULQFRQYHQLHQWIRUHQG-users, it
ZRQ¶WEHDFFHSWHG Organizations face a tough
challenge, trying to address evolving security threats
without hampering productivity or increasing IT costs.
Increased Security
Reduced Support Cost
(Admin productivity)
Two-factor
with Tokens
Password
Self Reset
Fingerprint
Authentication
Traditional
Password
Authentication
Easier to Use
Single Sign-On
(End-user productivity)
Fingerprint authentication eliminates the reliance on
users to manage their authentication credentials
(passwords, tokens, etc). And, bHFDXVHLW¶VKDUGWR
forget a finger, fingerprints avoid many of the issues
that drive up support costs with other mechanisms.
Don Davis, CIO and Senior Vice President of
Information Services at Rite Aid, said they chose to
use DigitalPersona technology in their pharmacies
EHFDXVHRI³WKHHIILFLHQFLHVZHIHOWZHZRXOGREWDLQ
from not having to administer password resets, the
speed of logging into the system, audit trail creation
and compliance with role-EDVHGWDVNV´
+RZ'LJLWDO3HUVRQD¶V)LQJHUSULQW
Technology Works
'LJLWDO3HUVRQD¶Vfingerprint biometrics solutions
combine a highly-accurate fingerprint recognition
engine, rich user experience features, centralized
manageability and a broad set of applications.
These solutions work with DYDULHW\RIYHQGRUV¶
fingerprint readers, both built into computers (such
as in notebooks) or plugged in as peripherals.
'LJLWDO3HUVRQD¶VWHFKQRORJ\LVZHOO-proven and is
used by over 90 million people around the world.
Users VHWXSRU³enroll´WKHLUILQJHUSULQWV by simply
scanning one or more fingers. DigitalPersona Pro
software on the PC extracts a mathematical
representation of the fingerprint called a ³WHPSODWH´
and uses that for all operations ± it does not store any
fingerprint images. Templates are then sent to the
DigitalPersona Pro server where they are stored in
Active Directory so that the user can use fingerprints
from anywhere on the network without having to reenroll at each computer.
When users wish to authenticate (for login, canceling
a screensaver or other places where a password is
typically used), they touch the fingerprint reader. A
template representing their fingerprint is created and
compared against the template that was registered
during enrollment. If the templates match, the
DigitalPersona Pro client software takes appropriate
action, such as writing an audit trail, logging the user
in or asking for other authentication information such
as a PIN (depending upon policies set by the
administrator). Client-side caching of templates
ensures that fingerprints can be used even when the
computer is not connected to the corporate network.
Simple Deployment on Existing Infrastructure ±
DigitalPersona Pro is designed to work with existing
PCs, servers, networks, and applications without
the need for extensive consulting or custom
programming. Client software can be easily
deployed wherever needed through existing
mechanisms for distributing standard MSI files,
including Active Directory GPOs, SMS, or other
software distribution tools.
Fingerprint logons can be added on top of current
and future Web, Citrix or legacy apps by an
administrator without having to modify the
application. This configuration information can then
be pushed to eacKXVHU¶VFRPSXWHUYLD*32V.
Individual users specifically do not have to set up
fingerprint authentication for each logon page.
Users only enter their ID and password one more
time to initialize fingerprint authentication. When the
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
5
logon page is opened, DigitalPersona Pro prompts
the user for their fingerprint, avoiding the need for
any special user training.
Integration with Active Directory ± DigitalPersona
Pro is certified by Microsoft to extend the Active
Directory schema to store biometric data in each
user¶V data records. DigitalPersona Pro uses the
native user interface of Active Directory, eliminating
the need to learn new tools. Administrators can use
the Active Directory Group Policy Editor to create
Group Policy Objects (GPOs) for tailoring the
behavior and functionality of DigitalPersona Pro. This
familiar point-and-click interface makes it easy to
configure or make changes for groups of users
DQ\ZKHUHLQWKHRUJDQL]DWLRQ¶VQHWZRUN.
"The strongest return on our DigitalPersona Pro
investment came through a reduction in
demand on our help desk, where passwordrelated help desk calls have dropped by 90%."
Patrick Honny
Department Information Services Manager
County of San Bernardino, California
Summary
Using fingers to authenticate creates a more secure
environment by enabling users to prove who they
are in the most natural way. Users enjoy
fingerprints since they eliminate the pain of
remembering and typing passwords. Because
fingerprints are so fast and easy to use, they
provide users a natural interface for otherwise
complicated security actions such as:
Strong Passwords ± Users no longer care
how complicated or how often WKH\¶UH changed.
Multi-factor Authentication ± )LQJHUVFDQ¶WEH
forgotten, lost or stolen.
Incremental Rollout ± Each domain controller
running the DigitalPersona Pro server can support
3000 concurrent fingerprint authentications.
DigitalPersona Pro scales linearly by adding server
software to additional domain controllers. Using DNS
capabilities in Windows, DigitalPersona Pro servers
are automatically detected, allowing new servers to
be added incrementally. DigitalPersona Pro takes
advantage of Active Directory to provide automatic
server load balancing, data replication and failover.
'LJLWDO3HUVRQD3URFDQEHDGGHGWRQHZXVHUV¶
computers without disrupting existing users. Similarly,
fingerprint logons for new applications can be added
at any time.
Transactional-level Accountability ±
Fingerprints can be used without special effort,
making them part of XVHUV¶ normal routine.
Fingerprints are a powerful approach for
implementing strong security. They uniquely align
users¶ natural drive for convenience with
businessHV¶ need for security.
Considering that fingerprint authentication is more
convenient, easier to use, more secure and reduces
costs, the decision to go with fingerprint recognition
technology is an easy one.
© 2008 DigitalPersona Inc. All rights reserved. DigitalPersona is
a trademark of DigitalPersona, Inc., registered in the United
States and other countries. All other trademarks referenced
herein are the property of their respective owners.
Result: Strong Security with Fast ROI
Fingerprint authentication solutions link individual
people to specific actions, allowing organizations to
know for sure who is doing what, where and when.
This information is critical for maintaining security
and fingerprints can make it easy to deploy strong
security policies. In addition, fingerprint systems
can also rapidly pay for themselves in helpdesk
savings.
How to Implement Strong Security Policies in Ways that Users Rapidly Embrace
6