SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
Deploying Strong
Authentication to a Global
Enterprise: A Comedy in
Three Acts
Laura E. Hunter
@adfskitteh
Cards Against Identity
Act One: The Perpetual Pilot
Cards Against Identity
Microsoft IT’s Azure MFA
Deployment was in Pilot for
______ months…
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month Cards Against Identity1 month Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month 2 months1 month 2 months
Cards Against Identity
6 months Cards Against Identity
1 month 2 months1 month 2 months
Cards Against Identity
6 months 12 months
1 month 2 months
12 months
Cards Against Identity
Why so long?
Cards Against Identity
“Sharp Edges” in the User
Experience
Cards Against Identity
Lack of Top-Down
Organizational Messaging
Cards Against Identity
A year-long pilot was still
worthwhile, because it
allowed IT to ___________
and ___________.
Cards Against Identity
Learn How To Operate a New
Service Offering
Cards Against Identity
Plan for Scale
Cards Against Identity
Act Two: The Inciting Event
Cards Against Identity
Cards Against Identity
What did Laura get for
Christmas this year?
Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month Cards Against IdentityA pony Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month 2 monthsA pony New shoes
Cards Against Identity
Back2back Seahawks
Super Bowl victories
Cards Against Identity
1 month 2 monthsA pony New shoes
Cards Against Identity
Back2back Seahawks
Super Bowl victories
A 9:30am Christmas-
morning conference 

call with her CISO
A pony New shoes
A 9:30am Christmas-morning
conference call with her
CISO
Cards Against Identity
“Hey IT…you can roll out
strong auth to all Microsoft
users by the end of the
month, right?”
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month Cards Against Identity“Is there a hole in the
ground that I can
disappear into right
now?”
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month 2 months“Is there a hole in the
ground that I can
disappear into right
now?”
“Are you directly out of
your everloving mind?”
Cards Against Identity
“Absolutely, boss. We
can get that done.”
Cards Against Identity
1 month 2 months“Is there a hole in the
ground that I can
disappear into right
now?”
“Are you directly out of
your everloving mind?”
Cards Against Identity
“Absolutely, boss. We
can get that done.”
“Sorry, can we chat
later? I’m watching
Winter Soldier.”
“Is there a hole in the
ground that I can
disappear into right
now?”
“Are you directly out of
your everloving mind?”
“Absolutely, boss. We can
get that done.”
Cards Against Identity
So how did it go, Laura?
Cards Against Identity
Executive sponsorship…
Cards Against Identity
…including acceptance of
some rough edges…
Cards Against Identity
…led to a largely successful
deployment of strong auth to
Microsoft employees.
Cards Against Identity
Act Three: The New Normal
Cards Against Identity
What Constitutes a
Legitimate Exception to
Strong Auth Policy?
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month Cards Against Identity“I’m sitting on my sofa
with my iPad. My laptop
is on my kitchen table
and I don’t feel like
getting up to go get it.”
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month 2 months“I’m sitting on my sofa
with my iPad. My laptop
is on my kitchen table
and I don’t feel like
getting up to go get it.”
Retail employees
working the sales floor.
Cards Against Identity
“I do customer demos.” Cards Against Identity
1 month 2 months“I’m sitting on my sofa
with my iPad. My laptop
is on my kitchen table
and I don’t feel like
getting up to go get it.”
Retail employees
working the sales floor.
Cards Against Identity
“I do customer demos.” “NEIN! NEIN! NEIN!

ZERE VIL’ BE NO
EXCEPTIONS!”
“I’m sitting on my sofa
with my iPad. My laptop
is on my kitchen table
and I don’t feel like
getting up to go get it.”
Retail employees
working the sales floor.
After a Strong Auth Rollout,
What Will IT Get Blamed For?
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month Cards Against Identity“I can’t get on wireless,
is it because of 2FA?”
Cards Against Identity
Cards Against Identity
Cards Against Identity Cards Against Identity
1 month 2 months“I can’t get on wireless,
is it because of 2FA?”
“I can’t renew my smart
card, is this because of
2FA?”
Cards Against Identity
“The MDM PIN policy
changed, is this because
of 2FA?”
Cards Against Identity
1 month 2 months“I can’t get on wireless,
is it because of 2FA?”
“I can’t renew my smart
card, is this because of
2FA?”
Cards Against Identity
“The MDM PIN policy
changed, is this because
of 2FA?”
“<%insert name of app
%> wouldn’t launch this
morning, is it because of
2FA?”
“I can’t get on wireless,
is it because of 2FA?”
“I can’t renew my smart
card, is this because of
2FA?”
“The MDM PIN policy
changed, is this because of
2FA?”
Cards Against Identity
Postlude: The Road Ahead
Cards Against Identity
THANK YOU!
Laura E. Hunter
@adfskitteh
Cards Against Identity Template design:
stuart@stuartgil.es

Más contenido relacionado

Más de CloudIDSummit

Más de CloudIDSummit (20)

CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn FayCIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
 
CIS 2015 User Managed Access - George Fletcher
CIS 2015 User Managed Access - George FletcherCIS 2015 User Managed Access - George Fletcher
CIS 2015 User Managed Access - George Fletcher
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in Three Acts - Laura Hunter