two-factor authentication - technology at msu · information security confidential how two-factor...

19
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015

Upload: vuongkhanh

Post on 13-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Two-Factor AuthenticationSolution Overview

Shawn Fulton

January 15th, 2015

Page 2: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

MSU Information Security Vision and Mission Statement

Vision

Diminish IT security risks to an acceptable level and become the most effective IT function; enable the University to make informed decisions based on risk.

Mission

Design, implement and maintain an information security program that protects the University’s resources against unauthorized use, modification and loss. Establish a practical information security program that enables MSU to be the best public research University in the world.

2

Page 3: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Two-Factor Goals

• Safe guard MSU employee data

• Safe guard MSU HR/Payroll and Finance data

• Provide additional security on EBS applications to prevent susceptibility to phishing attacks

3

Page 4: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Information Security Risks for MSU

4

Who’s perpetrating breaches?

How do breaches occur? What commonalities exist?

*Verizon Data Breach Investigations Report – 2013

(+) Is an increase of 10% or greater from last year

(-) Is a decrease of 10% or greater from last year

Page 5: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Payroll Incident Summary

5

• Millions of attempts to hack into MSU computer systems every day (>20 million prevented during month of May 2014)

• Millions of SPAM and phishing scams every day, some faculty, staff, and students take the bait

• Current safeguards in place:– Email SPAM filtering – Over 5 million SPAM and phishing emails blocked per day

– Anti-virus installed on workstations

– Security awareness training

• Two Payroll Incident Examples– October 2013 and March 2014

– Phishing emails are suspected of compromising the users’ EBS login credentials (user name and password)

– No breach of MSU systems/network appears to have occurred

– Risk currently mitigated by disabling online direct deposit changes

• People and process changes recommended to further improve prevention, detection, and response

Context:

Page 6: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Addressing Security Risks at MSU

6

Two-Factor Authentication

Security Policy

Dedicated Incident

Response

Security Awareness

Security Incident and Event

Management

Vulnerability Management

Defense in Depth Approach– Multiple layers of controls to reduce overall risk

Business enablement combined with risk reduction

Page 7: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Two-Factor Authentication Overview

7

Two-factor authentication requires the use of two of the three authentication factors:

Something only the user:

1. Knows (e.g. password, PIN, secret answer)

2. Has (e.g. ATM card, mobile phone, hard token)

3. Is (e.g. biometric – iris, fingerprint, etc.)

Page 8: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Who Uses Two-Factor?

8

Page 9: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

How Two-Factor Authentication Helps

Credentials are commonly stolen through:

– Phishing attacks targeted at MSU

– Third-party sites compromised and same username/password used for MSU applications• Adobe, Yahoo, LinkedIn, Forbes, Zappos, and eHarmony were breached

in past year, 32 million usernames and passwords stolen

– 15,000+ users registered with MSU email addresses, unknown how many used MSU password to register with these sites

Two-factor authentication prevents attackers from accessing your account even if they obtain your username and password.

9

Page 10: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Two-Factor Strategy at MSU

• Second Factor will be a“soft” Token

• Identify an Industry Leader for the Two-Factor Components

• Enhance MSU’s single sign-on solution (Sentinel) to integrate with Industry Leaders Solution to provide Two-Factor

• Enable Two-Factor for EBS applications (portal, HR, Payroll, Finance, BI) for all current employees.

10

Page 11: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Multiple deployment options available for MSU users:

1. Mobile application

2. SMS text message

3. Voice call made to desk, mobile, or home phone

Two-Factor Authentication Deployment Options

11

Page 12: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix A – Scope diagram

12

Sentinel

PortalCase 1, Step 2

CognosCase 2, Step 2

KFSCase 2, Step 2

ECC

STUINFO

Case 1, Step 1

SAP Internal Login

Out of Scope

XI/PI

MSUEDW

SAP Internal Login

In Scope

Case 1: User logs into EBS Portal1. Authenticate in Sentinel2. Routed to EBS Portal3. Navigate to other EBS applications

Basis Team & HR/Payroll Power Users –

Central Payroll and BAS Team

Case 1, Step 3

Case 1, Step 3

Case 1, Step 3

Case 2: User logs directly into EBS application

1. Authenticate in Sentinel2. Routed to EBS application

Page 13: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix B – Enrollment: Step 1

13

Page 14: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix B – Enrollment: Step 2

14

Page 15: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix B – Enrollment: Step 3

15

Page 16: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix B – Enrollment: Step 3

16

Page 17: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix B – Enrollment: Step 4

17

Page 18: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Appendix C – Login

18

Page 19: Two-Factor Authentication - Technology at MSU · Information Security Confidential How Two-Factor Authentication Helps Credentials are commonly stolen through: –Phishing attacks

Information Security Confidential

Department Presentations on

Two-Factor Authentication are Available

To schedule contact:Katherine Ball

[email protected](517) 353-3295

19