Secure Key Management- An important risk carrier
Author : Arindam Bhattacharya
Password and key management are the 2 most important element of data security. As businesses have gained more reliance on data, the data stakeholders along with other application agents, both are slowly developing extended risks. While password weakness can impact the entire business services, weak key management can push towards major data breaches. As of now both are going by the standard technology and processes but there are unknown factors that may cause secure status to marginal.
While data stakeholders are nothing but the business and application users, residents are the application agents (please read as module responsible for authentication and authorization) those are native or integrated with the application. These residents can bring unprecedented risks by the way they are developed or integrated.
That means, the risk of leakage is not only due to Common password related threats but also that may happen effortlessly through embedded programs designed to capture inputs. The risk is from the devices (if external programs capture keynstrokes) as well as application (where it is stored and how it is stored)
There is nothing more other than trust is driving this space. Then, how far safe computing can achieve by not sharing passwords can also be questionable.
Passwordless solutions gaining momentum and soon password as a service is the need. End to end distrust in authentication and access need to be designed to cover both server and end points due to gaps that exists in allowing users to choose their passwords (whether one password at enterprise or multiple in public) and sending the next factor keys to the untrusted devices.
This is important because as of now, public app/ sites including financial services are not serious on device security rather they are delivering the services based on the known standard but a lot of innovation required to onboard intelligent security for consumers.
Virtual key boards may safeguard only against a physical key board but not against a virtual keybaord at device app. Second thing that is required- technical assurance by independent body for the provider app.
As on today, no external sites must appear as safe because what passwords and encryption keys are used can be broken and possibilities are that they can be -
1. Un hashed at the backend (for example a decryption algorithms attached with the application may store decrypted passwords on a database table)
2. Stolen through Embedded Key logging programs (for example a program attached to record key strokes)
3. Broken advance encryptions through intelligent AI programs.
Adversarial AI programs are getting capable to introduce a big risk to the traditional and modernized applications where both encryption and key management are at risk. End users as well as the end programs are going to be impacted by this.
Only standard driven audits are not sufficient but as an auditor one would like to understand the logical explanation of the code base and integration along with an analysis on how the encryption libraries are exposed i.e., their accessibility/ visibility from both end-user systems (especially the developer and app support staff's systems) as well as other endpoints. Secondly, the API key management is also an important thing to look at.
How this risk can materialize? For example, a spyware dropped at the endpoint may execute AI programs remotely receiving / sending instruction and responses through Command and control sever which may further probe and intercept secure outbound connections/ key channels or even on encrypted data at rest.
Comments
Post a Comment