SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
Threat Modeling Authentication
Kelley Robinson | BSides PDX 2018
Vertex-based
Elliptic Cryptography
on N-way
Bojangle SpacesPasswords
🤷
Simple Complex
@kelleyrobinson
“How can we help users avoid harm?
This begins with a clear understanding
of the actual harms they face, and a
realistic understanding of their
constraints.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
Threat Modeling Authentication
Kelley Robinson
@kelleyrobinson
☎🔐👋 %
@kelleyrobinson
https://www.owasp.org/index.php/Application_Threat_Modeling
🔐 What are we going to do about that?
✅ Did we do a good job?
🚩 What can go wrong?
Application Threat Modeling
🏗 What are we building?
@kelleyrobinson
🏗 What are we building?
💰
💰
💰
@kelleyrobinson
1. Your users have
something of value
connected to an
account
*
+
,
Assumptions
@kelleyrobinson
*
+
,
2. A user can only
access the value
once they are
authenticated
Assumptions
💰
💰
💰
@kelleyrobinson
💰
💰
💰
*
+
,
3. A successful
impersonator could
also access that
value
Assumptions
How
common
is this?
@kelleyrobinson
💰$5.1B💰
In 2017
@kelleyrobinson
@kelleyrobinson
https://xkcd.com/1121/
Physical Identities
• Face
• Voice
• Fingerprints
Contextual Identities
• Email address
• Phone number
• Names and usernames
Government Identities
• Driver license
• Social security card
• Birth certificate
@kelleyrobinson
@kelleyrobinson
Physical Identities
• Most trustworthy
• Practically impossible to change
@kelleyrobinson
Government Identities
• Very trustworthy
• Usually physical
• Difficult to change
@kelleyrobinson
Contextual Identities
• Not 1:1 relationship
• Easier to change
Why is identity
management hard?
• Imperfect systems
• We may never know if we
got it right
• Trust waterfalls
@kelleyrobinson
🚩 What can go wrong?
@kelleyrobinson
“It is mainly time, and not money, that
users risk losing when attacked. It is also
time that security advice asks of them.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
@kelleyrobinson
Think about average case
instead of worst case.
@kelleyrobinson
1. Compromised factors
(hacked, guessed, or brute forced)
2. Phishing or vishing
🚩 What can go wrong?
https://www.nds.rub.de/media/ei/veroeffentlichungen/2017/01/13/OIDCSecurity_1.pdf
https://tools.ietf.org/html/rfc6819
@kelleyrobinson
☎ Requests via contact center
Authentication: known weak points
↩ Account recovery
@kelleyrobinson
☎ Requests via contact center
• Vishing
• Humans are fallible
@kelleyrobinson
↩ Account recovery
• How strict do you want to make it?
• Password resets, security questions,
backup codes...
@kelleyrobinson
Account value
Likelihoodofbeingatarget
Very Official
Risk Assessment
@kelleyrobinson
Money
Information
Control
Power
Account value*
Likelihoodofbeingatarget
@kelleyrobinson
🔐 What are we going to do?
@kelleyrobinson
“We must prioritize advice...Since users
cannot do everything, they must select
which advice they will follow and will
ignore.
”Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
@kelleyrobinson
Single Sign-on 🤷
Authentication Factors
• Something you know
• Something you have
• Something you are
@kelleyrobinson
@kelleyrobinson
@kelleyrobinson
Something you know: Passwords
https://blog.github.com/2018-07-31-new-improvements-and-best-practices-for-account-security-and-recoverability/
https://www.twilio.com/blog/2018/06/round-up-libraries-for-checking-pwned-passwords-in-your-7-favorite-languages.html
@kelleyrobinson
Multi Factor Authentication
• SMS / Voice
• TOTP
• Push
• Yubikey
@kelleyrobinson
How to drive adoption of MFA
• Profile settings
• Prompt during onboarding
• Have an ICO
40% adoption
100% adoption
2% adoption
SMS 2FA is still
better than
no 2FA
@kelleyrobinson
“When we exaggerate all dangers we
simply train users to ignore us.
@kelleyrobinson
Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
”
Employees*
Moderators
Everyone else
Potential Reddit 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
*might be managed by IT, not dev
Balance over $250k
Balance over $10k
Everyone else
Potential Banking 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
Verified accounts
Over 1,000 followers
Everyone else
Potential Twitter 2FA Model
Required token
based 2FA
Required 2FA
Optional 2FA
@kelleyrobinson
☎ Requests via contact center
Authentication: known weak points
↩ Account recovery
@kelleyrobinson
https://twitter.com/patio11/status/1053205207964823552
☎
Requests
via contact
center
@kelleyrobinson
↩ Account recovery
• Use authentication factors instead of identity
(i.e. pin code instead of SSN)
• Use security questions that aren't fact based
(unavailable via OSINT)
http://goodsecurityquestions.com/examples/
@kelleyrobinson
✅ Did we do a good job?
@kelleyrobinson
ℹ Support costs relative to losses ⬇
💰 Losses due to account takeover ⬇
😈 Number of compromised accounts ⬇
😃 Customer satisfaction ⬆
@kelleyrobinson
“Security people are full of morbid and
detailed monologues about the pervasive
catastrophes that surround us.
”James Mickens, This World of Ours
@kelleyrobinson
"I dared two expert hackers to destroy my life. Here's what happened."
@kelleyrobinson
Don't blame users
for bad passwords.
It's our responsibility to protect them.
@kelleyrobinson
THANK YOU!
@kelleyrobinson

Más contenido relacionado

Similar a BSides PDX - Threat Modeling Authentication

Session5 conversion optimization
Session5 conversion optimizationSession5 conversion optimization
Session5 conversion optimization
Digital Vidya
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
Gene Kim
 
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
Clément Delangue
 

Similar a BSides PDX - Threat Modeling Authentication (20)

What is ? Modern business questions 2014
What is ? Modern business questions 2014What is ? Modern business questions 2014
What is ? Modern business questions 2014
 
“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...
“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...
“Digital Transformation: Going Beyond Buzzwords” - ConveyUX Boston 2019 Keyno...
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Session5 conversion optimization
Session5 conversion optimizationSession5 conversion optimization
Session5 conversion optimization
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
Biometric authentication methods
Biometric authentication methodsBiometric authentication methods
Biometric authentication methods
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity System
 
Organizational Challenge of Enterprise Roadmapping
Organizational Challenge of Enterprise RoadmappingOrganizational Challenge of Enterprise Roadmapping
Organizational Challenge of Enterprise Roadmapping
 
MarTech 2017: A Scientific Look at B2B Buying in the Age of AI
MarTech 2017: A Scientific Look at B2B Buying in the Age of AIMarTech 2017: A Scientific Look at B2B Buying in the Age of AI
MarTech 2017: A Scientific Look at B2B Buying in the Age of AI
 
Balancing Community, Conversation & Conversion
Balancing Community, Conversation & ConversionBalancing Community, Conversation & Conversion
Balancing Community, Conversation & Conversion
 
Social CRM november 5, 2013
Social CRM november 5, 2013Social CRM november 5, 2013
Social CRM november 5, 2013
 
Annual Scary Episode on What's Scaring Us for 2016
Annual Scary Episode on What's Scaring Us for 2016Annual Scary Episode on What's Scaring Us for 2016
Annual Scary Episode on What's Scaring Us for 2016
 
Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...
Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...
Content Marketing World Presentation [Tech Industry Workshop]: Helping, Not H...
 
Online Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer CareOnline Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer Care
 
A Marketer's Guide to Ecommerce Growth Hacking
A Marketer's Guide to Ecommerce Growth HackingA Marketer's Guide to Ecommerce Growth Hacking
A Marketer's Guide to Ecommerce Growth Hacking
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
How 200,000 companies including Century 21, Intercom, Reputation Squad, Worka...
 
Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...
Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...
Graduate to Engagement Marketing Through Marketing Automation by Marketo & Sc...
 

Más de Kelley Robinson

Más de Kelley Robinson (20)

Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
WebAuthn
WebAuthnWebAuthn
WebAuthn
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
 
2FA in 2020 and Beyond
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and Beyond
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 
Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
 
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
 
PSD2, SCA, WTF?
PSD2, SCA, WTF?PSD2, SCA, WTF?
PSD2, SCA, WTF?
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ Startups
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
2FA, WTF!?
2FA, WTF!?2FA, WTF!?
2FA, WTF!?
 
2FA WTF
2FA WTF2FA WTF
2FA WTF
 

Último

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 

BSides PDX - Threat Modeling Authentication