SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Sysfore Technologies
#117-120, First Floor, 4th Block, 80 Feet Road, Koramangala, Bangalore 560034
RISK-BASED AUTHENTICATION
IN CLOUD
Risk-based Authentication in Cloud:
At the time when data theft is rampant in the cyber world, it’s necessary to stem
the growing uneasiness among users about the security and protection of their
personal data. The reason for this breach is the password thefts. Once a hacker
gets hold of a password, it can be used to access any of the victims online
accounts, resulting in privacy and security being compromised.
One way to overcome this security breach is to have a strong risk based
authentication process in place. Also known as multi factor authentication, it is
an access control method that adds layers of identity verification to ensure only
authorized users gain network access.
Is Risk Based Authentication the answer?
It might seem that password based authentication is dead. But, the emerging
trend is providing Multifactor authentication along with the password
protection. This move is justified since the businesses have moved to the cloud.
The flexible, scalable and highly available nature of the Cloud is a pain point for
maintaining Identity and Access Management. Risk Based authentication
provides an additional level of authentication for your cloud applications. It is a
dynamic method of applying levels of protection to the system, based on various
factors.
It is a multi-step procedure to prevent any unauthorized access to sensitive data.
It requires multiple pieces of information such as passwords, hardware
credentials or software tokens, to be validated together, before a successful
attempt.
How does risk-based authentication work?
Usually risk based authentication determines a risk score for a login attempt,
based on a user’s behaviour including but not limited to location, previous
activity, device used etc. It triggers an action based on the risk threshold limit
which is set for a system. The more sensitive the system’s data is, the lower is
the threshold limit.
It takes into account the risk profiles to determine whether the requesting
access to the system is a valid one or not. As the level of risk increases, the
authentication process becomes more comprehensive and restrictive.
The risk based authentication uses elements such as location based, role
based, activity based and changes in the usual usage patterns:
 Role-based: Depending on who is accessing the account, they must pass
a more stringent authentication content. Different levels of
authentication is required for different users, such as a network
administrator or for a regular user.
 Location-based: Either by detecting the physical endpoint or specific
geographic location. For example, if the user logged in ten minutes ago
from a particular location, and is now trying to log in from another
location which is practically impossible for him to be present, then it’s
definitely considered a high-risk transaction. Other attributes can figure
into the overall risk score, too.
 IP Address-based: The IP address of the physical device or the end point
of the connection is used to verify.
 Activity-based: For example, large-value account transfers have a higher
risk associated than just a balance inquiry.
 Changes in usual transaction patterns: If a user is doing something that
doesn’t match his or her purchase history, then that becomes a riskier
transaction, and additional authentication measures are required for
requests and logins.
Importance of risk based authentication
Risk-based authentication helps judge whether users are actually who they say
they are, determines the correct (or minimum) credential requirements and
works with a range of credentials.
Adaptive or risk-based authentication allows you to evaluate a set of
contextual factors related to access attempts or transactions to better
estimate the risk involved, without impacting the experience for legitimate
users. As a robust, multi-channel risk assessment and fraud detection solution,
it transparently helps you detect and prevent fraud. It also helps you with
maintaining your organization’s internal and external compliance
requirements, including FFIEC, HIPAA, PCI and SOX.
Before implementing a risk based authentication for your cloud network or
website, a correct risk assessment should be performed by the administrator
taking into account the following factors:
 The size of the system, in terms of the number of users. As a system
grows larger, the chance of a breach increases.
 The extent to which the system is critical to maintaining the operation of
the organization. The most critical systems carry the greatest risk of
serious damage in the event of a breach.
 The ease with which data can be compromised or the system cracked by
someone with the means and intent to do so. In spite of budget
constraints, the protective measures such as firewalls and antivirus
software should be robust and up-to-date
 Sensitive vital customer information such as names, addresses, numbers,
and Social Security numbers requires enhanced protection.
Drop a mail to info@sysfore.com or call us at +91-80-4110-5555 and our cloud
experts will provide you more information on the Risk Based Authentication
required for your organization.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
Security and trust. gabriel waller, nokia siemens networks.
Security and trust. gabriel waller, nokia siemens networks.Security and trust. gabriel waller, nokia siemens networks.
Security and trust. gabriel waller, nokia siemens networks.
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Deltecs Services for Vulnerability Assessment and penetration testing
Deltecs Services for Vulnerability Assessment and penetration testingDeltecs Services for Vulnerability Assessment and penetration testing
Deltecs Services for Vulnerability Assessment and penetration testing
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
Secure Code Warrior - Logging
Secure Code Warrior - LoggingSecure Code Warrior - Logging
Secure Code Warrior - Logging
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security Center
 
Heartland
HeartlandHeartland
Heartland
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security Framework
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Top Cloud Security Risks of 2020
Top Cloud Security Risks of 2020Top Cloud Security Risks of 2020
Top Cloud Security Risks of 2020
 
Blockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityBlockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurity
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
Learnings from the Cloud: What to Watch When Watching for Breach
Learnings from the Cloud:  What to Watch When Watching for BreachLearnings from the Cloud:  What to Watch When Watching for Breach
Learnings from the Cloud: What to Watch When Watching for Breach
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbm
 

Semelhante a Risk-based Authentication In Cloud | Sysfore

Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
Hai Nguyen
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional
TatianaMajor22
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
Laura Martin
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
Alexandru Pasaila
 

Semelhante a Risk-based Authentication In Cloud | Sysfore (20)

Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional 1. Respond to other student Discussion Board providing additional
1. Respond to other student Discussion Board providing additional
 
C02
C02C02
C02
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERVWhat is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERV
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Risk-based Authentication In Cloud | Sysfore

  • 1. Sysfore Technologies #117-120, First Floor, 4th Block, 80 Feet Road, Koramangala, Bangalore 560034 RISK-BASED AUTHENTICATION IN CLOUD
  • 2. Risk-based Authentication in Cloud: At the time when data theft is rampant in the cyber world, it’s necessary to stem the growing uneasiness among users about the security and protection of their personal data. The reason for this breach is the password thefts. Once a hacker gets hold of a password, it can be used to access any of the victims online accounts, resulting in privacy and security being compromised. One way to overcome this security breach is to have a strong risk based authentication process in place. Also known as multi factor authentication, it is an access control method that adds layers of identity verification to ensure only authorized users gain network access. Is Risk Based Authentication the answer? It might seem that password based authentication is dead. But, the emerging trend is providing Multifactor authentication along with the password protection. This move is justified since the businesses have moved to the cloud. The flexible, scalable and highly available nature of the Cloud is a pain point for maintaining Identity and Access Management. Risk Based authentication provides an additional level of authentication for your cloud applications. It is a dynamic method of applying levels of protection to the system, based on various factors. It is a multi-step procedure to prevent any unauthorized access to sensitive data. It requires multiple pieces of information such as passwords, hardware credentials or software tokens, to be validated together, before a successful attempt. How does risk-based authentication work? Usually risk based authentication determines a risk score for a login attempt, based on a user’s behaviour including but not limited to location, previous activity, device used etc. It triggers an action based on the risk threshold limit which is set for a system. The more sensitive the system’s data is, the lower is the threshold limit.
  • 3. It takes into account the risk profiles to determine whether the requesting access to the system is a valid one or not. As the level of risk increases, the authentication process becomes more comprehensive and restrictive. The risk based authentication uses elements such as location based, role based, activity based and changes in the usual usage patterns:  Role-based: Depending on who is accessing the account, they must pass a more stringent authentication content. Different levels of authentication is required for different users, such as a network administrator or for a regular user.  Location-based: Either by detecting the physical endpoint or specific geographic location. For example, if the user logged in ten minutes ago from a particular location, and is now trying to log in from another location which is practically impossible for him to be present, then it’s definitely considered a high-risk transaction. Other attributes can figure into the overall risk score, too.  IP Address-based: The IP address of the physical device or the end point of the connection is used to verify.  Activity-based: For example, large-value account transfers have a higher risk associated than just a balance inquiry.  Changes in usual transaction patterns: If a user is doing something that doesn’t match his or her purchase history, then that becomes a riskier
  • 4. transaction, and additional authentication measures are required for requests and logins. Importance of risk based authentication Risk-based authentication helps judge whether users are actually who they say they are, determines the correct (or minimum) credential requirements and works with a range of credentials. Adaptive or risk-based authentication allows you to evaluate a set of contextual factors related to access attempts or transactions to better estimate the risk involved, without impacting the experience for legitimate users. As a robust, multi-channel risk assessment and fraud detection solution, it transparently helps you detect and prevent fraud. It also helps you with maintaining your organization’s internal and external compliance requirements, including FFIEC, HIPAA, PCI and SOX. Before implementing a risk based authentication for your cloud network or website, a correct risk assessment should be performed by the administrator taking into account the following factors:  The size of the system, in terms of the number of users. As a system grows larger, the chance of a breach increases.  The extent to which the system is critical to maintaining the operation of the organization. The most critical systems carry the greatest risk of serious damage in the event of a breach.  The ease with which data can be compromised or the system cracked by someone with the means and intent to do so. In spite of budget constraints, the protective measures such as firewalls and antivirus software should be robust and up-to-date  Sensitive vital customer information such as names, addresses, numbers, and Social Security numbers requires enhanced protection. Drop a mail to info@sysfore.com or call us at +91-80-4110-5555 and our cloud experts will provide you more information on the Risk Based Authentication required for your organization.