Smart & Frictionless Zero Trust Access

0
211
Smart & Frictionless Zero Trust Access


Providing safe entry and a frictionless person expertise are sometimes competing initiatives, however they don’t must be! Read on to be taught why.

In our world at this time, context adjustments rapidly. We earn a living from home, espresso retailers and the workplace. We use a number of gadgets to do work. And on the flip facet, attackers have gotten more and more savvy, getting round safety controls, reminiscent of multi-factor authentication (MFA), to achieve unauthorized entry.

To quote Wendy Nather, Cisco’s head of Advisory CISOs, “Trust is neither binary nor permanent.” Therefore, safety controls should consistently consider for change in belief, however with out including pointless friction for end-users.

It’s no shock that the lately printed Cybersecurity Readiness Index, a survey of 6,700 cybersecurity leaders from throughout the globe, revealed that extra progress is required to guard identification, networks and purposes.

To deal with these challenges and to make zero belief entry for the workforce simple and frictionless, Cisco Duo introduced the final availability of Risk-Based Authentication and enhancements to our enterprise prepared Single Sign-On resolution at Cisco Live EMEA 2023 earlier this week.

Risk-Based Authentication

Chart showing how Risk-Based Authentication starts by evaluating the risk signal analysis based off of device trust, location, wi-fi fingerprint, and known attack patterns. Based of off this, it decides what kind of authentication is required - including no authentication, Duo push 2FA, verified Duo push, FIDO2 authenticator - before allowing (or blocking) access to corporate resources.

Risk-Based Authentication fulfills the zero belief philosophy of steady belief verification by assessing the danger degree for every entry try in a fashion that’s frictionless to customers. A better degree of authentication is required solely when there is a rise in assessed threat. Duo dynamically detects threat and routinely steps up authentication with two key insurance policies:

1. Risk-Based Factor Selection

The Risk-Based Factor Selection coverage detects and analyzes authentication requests and adaptively enforces essentially the most safe elements. It highlights threat and adapts its understanding of regular person habits. It does this by searching for recognized assault patterns and anomalies after which permitting solely the safer authentication strategies to achieve entry.

For instance, Duo can detect if a company or worker is being focused for a push bombing assault or if the authentication system and entry system are in two completely different nations, and Duo responds by routinely elevating the authentication request to a safer issue reminiscent of phishing resistant FIDO2 safety keys or Verified Duo Push.

Chart showing how Risk-Based Authentication, when picking up on known attack patterns, will either request a Verified Duo Push or Block access.

2. Risk-Based Remembered Devices

The Risk-Based Remembered Devices coverage establishes a trusted system session (like “remember this computer” test field), routinely with out asking the person the test a field, throughout a profitable authentication. Once the session is established, Duo appears to be like for anomalous IP addresses or adjustments to a tool all through the lifetime of the trusted session and requires re-authentication provided that it observes a change from historic baselines.

The coverage additionally incorporates a Wi-Fi Fingerprint offered by Duo Device Health app to make sure that IP deal with adjustments replicate precise adjustments in location and never regular utilization eventualities reminiscent of a person establishing an organizational VPN (Virtual Private Network) session.

Chart showing how Risk-Based Authentication, when using location and wi-fi fingerprint to determine that risk levels are low, won't require authentication.

Duo makes use of anonymized Wi-Fi Fingerprint to reliably detect whether or not the entry system is in the identical location because it was for earlier authentications by evaluating the Wi-Fi networks which might be “visible” to the entry system. Further, Duo preserves person privateness and doesn’t observe person location or gather any personal info. Wi-Fi Fingerprint solely lets Duo know if a person has modified location.

Single Sign-On

A typical group makes use of over 250 purposes. Single sign-on (SSO) options assist workers entry a number of purposes with a single set of credentials and permit directors to implement granular insurance policies for utility entry from a single console. Integrated with MFA or passwordless authentication, SSO serves as a important entry administration software for organizations that need to implement zero belief entry to company purposes.

Chart showing how Duo SSO integrates with SAML 2.0 and OIDC applications

Duo SSO is already standard amongst Duo’s clients. Now, we’re including two new capabilities that cater to trendy enterprises:

1. Support for OpenID Connect (OIDC)

An rising variety of purposes use OIDC for authentication. It is a contemporary authentication protocol that lets utility and web site builders authenticate customers with out storing and managing different individuals’s passwords, which is each tough and dangerous. To date, Duo SSO has supported SAML internet purposes. Supporting OIDC permits us to guard extra of the purposes that our clients are adopting as all of us transfer in the direction of a mobile-first world and combine stronger and trendy authentication strategies.

2. On-Demand Password Resets

Password resets are costly for organizations. It is estimated that 20-50% of IT helpdesk tickets are for password resets. And based on a report by Ponemon Institute, massive enterprises expertise an common lack of $5.2 million a yr in person productiveness as a consequence of password resets.

When logging into browser-based purposes, Duo SSO already permits customers to reset passwords once they have expired in the identical login workflow. And we heard from our clients that customers need the choice to proactively reset passwords. Now, Duo SSO affords the comfort to reset their Active Directly passwords earlier than they expire. This functionality additional will increase person productiveness and reduces IT helpdesk tickets.

Screenshot of Duo's self-service password reset prompt

Risk-Based Authentication and enhancements to Duo SSO can be found now to all paying clients based mostly on their Duo Edition. If you aren’t but a Duo buyer, join a free 30-day trial and check out these new capabilities at this time!


We’d love to listen to what you suppose. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Secure Social Channels

Instagram
Facebook
Twitter
LinkedIn

Share:

LEAVE A REPLY

Please enter your comment!
Please enter your name here