Authentication: A Health-ISAC Guide for CISOs
A deeper dive into the Framework, starting with authentication.
Scope Statement
MFA. OTP. FIDO. SMS. PKI. All of these acronyms might have you saying OMG, but they are each important to understand when it comes to managing authentication. It’s an anomaly these days when a major breach happens and compromised authentication systems don’t play a role. Multi Factor Authentication (MFA) is critical to stopping attacks — but as we’ll detail in this paper, not all MFA is the same, and attackers are catching up to some first-generation MFA tools. Health CISOs need to stay ahead of the curve.
This is the third installment in the H-ISAC’s ongoing series focused on helping CISOs implement an identitycentric approach to cybersecurity. Our first paper, Identity for the CISO Not Yet Paying Attention to Identity, explained why identity matters. We followed that with An H-ISAC Framework for CISOs to Manage Identity, outlining how CISOs can implement a comprehensive approach to identity-centric security that will protect against modern attacks and support key business drivers.
Now we’re going to start diving deeper into different areas of that framework, starting with authentication. Most cybersecurity professionals know that authentication is important, but many do not understand the differences between various authentication tools or how to best implement it in their organization. This paper was written to address those questions and includes two case studies detailing how different health organizations have implemented strong authentication.
Key Takeaways
- Passwords alone offer minimal security; MFA is essential.
- Not all MFA is the same. Attackers have found ways to phish authentication technologies such as one-time passwords (OTPs) that are based on “shared secrets.” Wherever possible, use high assurance, phishing-resistant tools such as FIDO or Public Key Infrastructure (PKI).
- Usability matters. MFA implementations struggle if they degrade the user experience. Modern MFA solutions offer streamlined authentication processes that are easier to use than passwords.
- Where feasible, move from static MFA to a multi-layered approach that integrates sign
H ISAC All About Authentication White Paper
Size : 7.6 MB Format : PDF
- Related Resources & News
- How Healthcare Facilities Can Prepare for All Types of Emergencies
- Health-ISAC Hacking Healthcare 10-24-2024
- UnHack (the Podcast): Generating Cyber Resilience Through Collaboration with Errol Weiss
- Newfangled and Fastest-Growing Phishing Cyberattacks: Updated Guide for Healthcare Leaders
- Health-ISAC Hacking Healthcare 10-15-2024
- Health-ISAC Welcomes Booz Allen Hamilton to the Ambassador Program
- Health-ISAC Hacking Healthcare 10-9-2024
- Monthly Newsletter – October 2024
- Health ISAC leads effort to transform SBOM information sharing under CISA-facilitated community work
- CyberEdBoard Insights: Phil Englert and Errol Weiss