{"id":1118758,"date":"2023-10-20T06:15:08","date_gmt":"2023-10-20T10:15:08","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/cisa-and-nsa-issues-new-identity-and-access-management-guidance-for-vendors-techrepublic\/"},"modified":"2023-10-20T06:15:08","modified_gmt":"2023-10-20T10:15:08","slug":"cisa-and-nsa-issues-new-identity-and-access-management-guidance-for-vendors-techrepublic","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cisa-and-nsa-issues-new-identity-and-access-management-guidance-for-vendors-techrepublic\/","title":{"rendered":"CISA and NSA Issues New Identity and Access Management Guidance for Vendors &#8211; TechRepublic"},"content":{"rendered":"<p><p>    The National Security Agency and the Cybersecurity and    Infrastructure Security Agency published on October 4, 2023, a    document titled Identity and Access Management:    Developer and Vendor Challenges. This new IAM CISA-NSA    guidance focuses on the challenges and tech gaps that are    limiting the adoption and secure employment of multifactor    authentication and Single Sign-On technologies within    organizations.  <\/p>\n<p>    The document was authored by a panel of public-private    cross-sector partnerships working under the CISA-NSA-led    Enduring Security Framework. The ESF is tasked with    investigating critical infrastructure risks and national    security systems. The guidance builds on their previous report,    Identity and Access Management    Recommended Best Practices Guide for Administrators.  <\/p>\n<p>    SEE: 8 Best    Identity and Access Management (IAM) Solutions for    2023  <\/p>\n<p>    In an email interview with TechRepublic, Jake Williams, faculty    member at IANS Research and former NSA offensive hacker, said,    The publication (its hard to call it guidance) highlights the    challenges with comparing the features provided by vendors.    CISA seems to be putting vendors on notice that they want    vendors to be clear about what standards they do and dont    support in their products, especially when a vendor only    supports portions of a given standard.  <\/p>\n<p>    Jump to:  <\/p>\n<p>    The CISA-NSA document detailed the technical challenges related    to IAM affecting developers and vendors. Specifically looking    into the deployment of multifactor authentication and    Single-Sign-On, the report highlights different gaps.  <\/p>\n<p>    According to CISA and the NSA, the definitions and policies of    the different variations of MFAs are unclear and confusing. The    report notes there is a need for clarity to drive    interoperability and standardization of different types of MFA    systems. This is impacting the abilities of companies and    developers to make better-informed decisions on which IAM    solutions they should integrate into their environments.  <\/p>\n<p>    The CISA-NSA report notes that vendors are not offering clear    definitions when it comes to the level of security that    different types of MFAs provide, as not all MFAs offer the same    security.  <\/p>\n<p>    For example, SMS MFA are more vulnerable than hardware storage    MFA technologies, while some MFA are resistant to     phishing  such as those based on public key infrastructure    or FIDO  while others are not.  <\/p>\n<p>    SEE:     The 10 Universal Truths of Identity and Access Management    (One Identity white paper)  <\/p>\n<p>    The CISA and NSA say that the architectures for leveraging open    standard-based SSO together with legacy applications are not    always widely understood. The report calls for the creation of    a shared, open-source repository of open standards-based    modules and patterns to solve these integration challenges to    aid in adoption.  <\/p>\n<p>    SSO capabilities are often bundled with other high-end    enterprise features, making them inaccessible to small and    medium organizations. The solution to this challenge would    require vendors to include organizational SSOs in pricing plans    that include all types of businesses, regardless of size.  <\/p>\n<p>    Another main gap area identified is MFA governance integrity    over time as workers join or leave organizations. The process    known as credential lifecycle management often lacks    available MFA solutions, the CISA-NSA report stated.  <\/p>\n<p>    The overall confusion regarding MFA and SSO, lack of specifics    and standards and gaps in support and available technologies,    are all affecting the security of companies that have to deploy    IAM systems with the information and services that are    available to them.  <\/p>\n<p>    An often-bewildering list of options is available to be    combined in complicated ways to support diverse requirements,    the report noted. Vendors could offer a set of predefined    default configurations, that are pre-validated end to end for    defined use cases.  <\/p>\n<p>    Williams told TechRepublic that the biggest takeaway from this    new publication is that IAM is extremely complex.  <\/p>\n<p>    Theres little for most organizations to do themselves,    Williams said, referring to the new CISA-NSA guidance. This    (document) is targeted at vendors and will certainly be a    welcome change for CISOs trying to perform apples-to-apples    comparisons of products.  <\/p>\n<p>    Williams said another key takeaway is the acknowledgment that    some applications will require users to implement hardware    security modules to achieve acceptable security. HSMs are    usually plug-in cards or external devices that connect to    computers or other devices. These security devices protect    cryptographic keys, perform encryption and decryption and    create and verify digital signatures. HSMs are considered a    robust authentication technology, typically used by banks,    financial institutions, healthcare providers, government    agencies and online retailers.  <\/p>\n<p>    In many deployment contexts, HSMs can protect the keys from    disclosure in a system memory dump, Williams said. This is    what led to highly sensitive keys being stolen from Microsoft by Chinese threat    actors, ultimately leading to the compromise of State    Department email.  <\/p>\n<p>    CISA raises this in the context of usability vs. security, but    its worth noting that nothing short of an HSM will adequately    meet many high-security requirements for key management,    Williams warns.  <\/p>\n<p>    The CISA-NSA document ends with a detailed section of key    recommendations for vendors, which as Williams says, puts them    on notice as to what issues they need to address. Williams    highlighted the need for standardizing the terminology used so    its clear what a vendor supports.  <\/p>\n<p>    Chad McDonald, chief information security officer of Radiant    Logic, also talked to TechRepublic via email and agreed with    Williams. Radiant Logic is a U.S.-based company that focuses on    solutions for identity data unification and integration,    helping organizations manage, use and govern identity data.  <\/p>\n<p>    Modern-day workforce authentication can no longer fit one    certain mold, McDonald said. Enterprises, especially those    with employees coming from various networks and locations,    require tools that allow for complex provisioning and do not    limit users in their access to needed resources.  <\/p>\n<p>    For this to happen, a collaborative approach amongst all    solutions is essential, added McDonald. Several of CISAs    recommendations for vendors and developers not only push for a    collaborative approach but are incredibly feasible and    actionable.  <\/p>\n<p>    McDonald said the industry would welcome standard MFA    terminology to allow equitable comparison of products, the    prioritization of user-friendly MFA solutions for both mobile    and desktop platforms to drive wider adoption and the    implementation of broader support for and development of    identity standards in the enterprise ecosystem.  <\/p>\n<p>    Create standard MFA terminology Regarding    the use of ambiguous MFA terminology, the report recommended    creating standard MFA terminology that provides clear,    interoperable and standardized definitions and policies    allowing organizations to make value comparisons and integrate    these solutions into their environment.  <\/p>\n<p>    Create phishing-resistant authenticators and then    standardize their adoption In response to the lack    of clarity on the security properties that certain MFA    implementations provide, CISA and NSA recommended additional    investment by the vendor community to create phishing-resistant    authenticators to provide greater defense against sophisticated    attacks.  <\/p>\n<p>    The report also concludes that simplifying and standardizing    the security properties of MFA and phishing-resistant    authenticators, including their form factors embedded into    operating systems, would greatly enhance the market. CISA and    NSA called for more investment to support high-assurance MFA    implementations for enterprise use. These investments should be    designed in a user-friendly flow, on both mobile and desktop    platforms, to promote higher MFA adoption.  <\/p>\n<p>    Develop more secure enrollment tooling    Regarding governance and self-enrollment, the report said its    necessary to develop more secure enrollment tooling to support    the complex provisioning needs of large organizations. These    tools should also automatically discover and purge enrollment    MFA authenticators that have not been used in a particular    period of time or whose usage is not normal.  <\/p>\n<p>    Vendors have a real opportunity to lead the industry and build    trust with product consumers with additional investments to    bring such phishing-resistant authenticators to more use cases,    as well as simplifying and further standardizing their    adoption, including in form factors embedded into operating    systems, would greatly enhance the market, stated the CISA and    the NSA.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.techrepublic.com\/article\/new-nsa-cisa-iam-guidance\/\" title=\"CISA and NSA Issues New Identity and Access Management Guidance for Vendors - TechRepublic\" rel=\"noopener\">CISA and NSA Issues New Identity and Access Management Guidance for Vendors - TechRepublic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The National Security Agency and the Cybersecurity and Infrastructure Security Agency published on October 4, 2023, a document titled Identity and Access Management: Developer and Vendor Challenges.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cisa-and-nsa-issues-new-identity-and-access-management-guidance-for-vendors-techrepublic\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1118758","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118758"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1118758"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118758\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1118758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1118758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1118758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}