SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
Threat Modeling Authentication
Kelley Robinson | BSides PDX 2018
Vertex-based
Elliptic Cryptography
on N-way
Bojangle SpacesPasswords
🤷
Simple Complex
@kelleyrobinson
“How can we help users avoid harm?
This begins with a clear understanding
of the actual harms they face, and a
realistic understanding of their
constraints.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
Threat Modeling Authentication
Kelley Robinson
@kelleyrobinson
☎🔐👋 %
@kelleyrobinson
https://www.owasp.org/index.php/Application_Threat_Modeling
🔐 What are we going to do about that?
✅ Did we do a good job?
🚩 What can go wrong?
Application Threat Modeling
🏗 What are we building?
@kelleyrobinson
🏗 What are we building?
💰
💰
💰
@kelleyrobinson
1. Your users have
something of value
connected to an
account
*
+
,
Assumptions
@kelleyrobinson
*
+
,
2. A user can only
access the value
once they are
authenticated
Assumptions
💰
💰
💰
@kelleyrobinson
💰
💰
💰
*
+
,
3. A successful
impersonator could
also access that
value
Assumptions
How
common
is this?
@kelleyrobinson
💰$5.1B💰
In 2017
@kelleyrobinson
@kelleyrobinson
https://xkcd.com/1121/
Physical Identities
• Face
• Voice
• Fingerprints
Contextual Identities
• Email address
• Phone number
• Names and usernames
Government Identities
• Driver license
• Social security card
• Birth certificate
@kelleyrobinson
@kelleyrobinson
Physical Identities
• Most trustworthy
• Practically impossible to change
@kelleyrobinson
Government Identities
• Very trustworthy
• Usually physical
• Difficult to change
@kelleyrobinson
Contextual Identities
• Not 1:1 relationship
• Easier to change
Why is identity
management hard?
• Imperfect systems
• We may never know if we
got it right
• Trust waterfalls
@kelleyrobinson
🚩 What can go wrong?
@kelleyrobinson
“It is mainly time, and not money, that
users risk losing when attacked. It is also
time that security advice asks of them.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
@kelleyrobinson
Think about average case
instead of worst case.
@kelleyrobinson
1. Compromised factors
(hacked, guessed, or brute forced)
2. Phishing or vishing
🚩 What can go wrong?
https://www.nds.rub.de/media/ei/veroeffentlichungen/2017/01/13/OIDCSecurity_1.pdf
https://tools.ietf.org/html/rfc6819
@kelleyrobinson
☎ Requests via contact center
Authentication: known weak points
↩ Account recovery
@kelleyrobinson
☎ Requests via contact center
• Vishing
• Humans are fallible
@kelleyrobinson
↩ Account recovery
• How strict do you want to make it?
• Password resets, security questions,
backup codes...
@kelleyrobinson
Account value
Likelihoodofbeingatarget
Very Official
Risk Assessment
@kelleyrobinson
Money
Information
Control
Power
Account value*
Likelihoodofbeingatarget
@kelleyrobinson
🔐 What are we going to do?
@kelleyrobinson
“We must prioritize advice...Since users
cannot do everything, they must select
which advice they will follow and will
ignore.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
@kelleyrobinson
Single Sign-on 🤷
Authentication Factors
• Something you know
• Something you have
• Something you are
@kelleyrobinson
@kelleyrobinson
@kelleyrobinson
Something you know: Passwords
https://blog.github.com/2018-07-31-new-improvements-and-best-practices-for-account-security-and-recoverability/
https://www.twilio.com/blog/2018/06/round-up-libraries-for-checking-pwned-passwords-in-your-7-favorite-languages.html
@kelleyrobinson
Multi Factor Authentication
• SMS / Voice
• TOTP
• Push
• Yubikey
@kelleyrobinson
How to drive adoption of MFA
• Profile settings
• Prompt during onboarding
• Have an ICO
40% adoption
100% adoption
2% adoption
SMS 2FA is still
better than
no 2FA
@kelleyrobinson
“When we exaggerate all dangers we
simply train users to ignore us.
@kelleyrobinson
Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
”
Employees*
Moderators
Everyone else
Potential Reddit 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
*might be managed by IT, not dev
Balance over $250k
Balance over $10k
Everyone else
Potential Banking 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
Verified accounts
Over 1,000 followers
Everyone else
Potential Twitter 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
@kelleyrobinson
☎ Requests via contact center
Authentication: known weak points
↩ Account recovery
@kelleyrobinson
https://twitter.com/patio11/status/1053205207964823552
☎
Requests
via contact
center
@kelleyrobinson
↩ Account recovery
• Use authentication factors instead of identity
(i.e. pin code instead of SSN)
• Use security questions that aren't fact based
(unavailable via OSINT)
http://goodsecurityquestions.com/examples/
@kelleyrobinson
✅ Did we do a good job?
@kelleyrobinson
ℹ Support costs relative to losses ⬇
💰 Losses due to account takeover ⬇
😈 Number of compromised accounts ⬇
😃 Customer satisfaction ⬆
@kelleyrobinson
“Security people are full of morbid and
detailed monologues about the pervasive
catastrophes that surround us.
”James Mickens, This World of Ours
@kelleyrobinson
"I dared two expert hackers to destroy my life. Here's what happened."
@kelleyrobinson
Don't blame users
for bad passwords.
It's our responsibility to protect them.
@kelleyrobinson
THANK YOU!
@kelleyrobinson

Contenu connexe

Similaire à BSides PDX - Threat Modeling Authentication

Session5 conversion optimization
Session5 conversion optimizationSession5 conversion optimization
Session5 conversion optimization
Digital Vidya
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
Gene Kim
 
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
Clément Delangue
 

Similaire à BSides PDX - Threat Modeling Authentication (20)

What is ? Modern business questions 2014
What is ? Modern business questions 2014What is ? Modern business questions 2014
What is ? Modern business questions 2014
 
“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...
“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...
“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Session5 conversion optimization
Session5 conversion optimizationSession5 conversion optimization
Session5 conversion optimization
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Biometric authentication methods
Biometric authentication methodsBiometric authentication methods
Biometric authentication methods
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity System
 
Organizational Challenge of Enterprise Roadmapping
Organizational Challenge of Enterprise RoadmappingOrganizational Challenge of Enterprise Roadmapping
Organizational Challenge of Enterprise Roadmapping
 
MarTech 2017: A Scientific Look at B2B Buying in the Age of AI
MarTech 2017: A Scientific Look at B2B Buying in the Age of AIMarTech 2017: A Scientific Look at B2B Buying in the Age of AI
MarTech 2017: A Scientific Look at B2B Buying in the Age of AI
 
Balancing Community, Conversation & Conversion
Balancing Community, Conversation & ConversionBalancing Community, Conversation & Conversion
Balancing Community, Conversation & Conversion
 
Social CRM november 5, 2013
Social CRM november 5, 2013Social CRM november 5, 2013
Social CRM november 5, 2013
 
Annual Scary Episode on What's Scaring Us for 2016
Annual Scary Episode on What's Scaring Us for 2016Annual Scary Episode on What's Scaring Us for 2016
Annual Scary Episode on What's Scaring Us for 2016
 
Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...
Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...
Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...
 
Online Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer CareOnline Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer Care
 
A Marketer's Guide to Ecommerce Growth Hacking
A Marketer's Guide to Ecommerce Growth HackingA Marketer's Guide to Ecommerce Growth Hacking
A Marketer's Guide to Ecommerce Growth Hacking
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
 
Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...
Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...
Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...
 

Plus de Kelley Robinson

Plus de Kelley Robinson (20)

Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
WebAuthn
WebAuthnWebAuthn
WebAuthn
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
 
2FA in 2020 and Beyond
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and Beyond
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 
Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
 
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
 
PSD2, SCA, WTF?
PSD2, SCA, WTF?PSD2, SCA, WTF?
PSD2, SCA, WTF?
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ Startups
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
2FA, WTF!?
2FA, WTF!?2FA, WTF!?
2FA, WTF!?
 
2FA WTF
2FA WTF2FA WTF
2FA WTF
 

Dernier

Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Dernier (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 

BSides PDX - Threat Modeling Authentication