Authentication Practices - American Bankers Association

advertisement
Tool 3: Managing and Controlling Risk
Safeguarding Customer Information
Authentication Practices
Authentication, the function of verifying the identity of persons seeking access to
information systems and/or electronic banking services, is a high-profile element of
safeguarding customer information. There are a variety of authentication tools and
systems in use today within the banking industry. These include user passwords, personal
identification numbers (PINs), digital certificates using public key infrastructure (PKI),
smart cards, tokens and other types of physical devices, and biometric identifiers. The
degree of security afforded by each of these tools/systems varies and is evolving as
technology changes.
Authentication methods generally fall into one of three basic categories or factors:
 Something the user knows (e.g., password, PIN);
 Something the user possesses (e.g., ATM or smart card, security token); or
 Something the user is (e.g., biometric characteristic, such as fingerprint or
 retinal pattern).
Authentication systems that involve more than one of these factors are typically more
difficult to compromise than single-factor systems. Implementation and maintenance of
multi-factor systems typically require greater financial and administrative resources.
Consequently, an efficient authentication system is one in which the associated resource
costs are commensurate with the sensitivity and criticality of the system/services being
protected. Further, the success of a particular authentication method depends on more
than the technology itself and the proper implementation of the technology. It also
depends on the adoption of and adherence to appropriate control policies, procedures, and
standards. Finally, an effective authentication method should have user acceptance,
reliable performance, scalability to accommodate growth, and interoperability with
existing and planned IT systems.
The Federal Financial Institutions Examination Council (FFIEC), issued Supervision and
Regulation Letter SR 00-20 dated August 15, 2001. This mailing distributed the FFIEC’s
guidance paper entitled “Authentication in an Electronic Banking Environment” dated
August 8, 2001. This guidance document specifically addresses authenticating customers
accessing an institution’s computer systems via the Internet, yet the principles discussed
AMERICAN BANKERS ASSOCIATION
also apply to authenticating bank employees and third-party vendors, suppliers, and
contractors attempting to access any bank-owned data and/or information system.
The guidance also applies whether the subject data or information systems are maintained
in-house by the bank or housed at external data processing service providers.
The FFIEC authentication guidance addresses four elements of an effective
authentication system relative to electronic banking systems: risk assessment; customer
verification during account origination; transaction initiation and authentication of
existing customers; and monitoring and reporting.
Risk Assessment
The implementation of effective authentication methods starts with management’s
assessment of the risk posed by the institution’s electronic banking systems. The risk
should be evaluated in light of the type of customer (e.g., retail or commercial), the
transaction capabilities available, the sensitivity and criticality of the stored information
to both the bank itself and the customer, and the size and volume of transactions. The
authentication method implemented for a specific electronic application should be
appropriate and commercially reasonable relative to the reasonably foreseeable risks in
that application.
From an enterprise-wide perspective, because institutions’ information systems and
product mixes change over time, management is expected to periodically conduct
additional risk assessments to determine whether modifications are needed to maintain
commercially reasonable authentication systems.
Customer Verification During Account Origination
In an electronic or online banking environment, the use of and reliance on traditional
forms of paper-based authentication (face-to-face presentation of an individual’s drivers
license, etc.) is generally not feasible. Alternative methods of authentication, verifying
personal information, are needed. A bank can verify a potential customer’s identity by
comparing their answers to a series of detailed questions against information in a trusted
database for consistency (e.g., a reliable credit report); such a process is known as
“positive verification”. Information provided by the potential customer may also be
reviewed for logical consistency (e.g., are the telephone area code, ZIP code, and street
address consistent with each other); this process is known as “logical verification.”
“Negative verification” is the process of comparing customer provided information
against fraud-related databases to determine whether any of the information is associated
with known incidents of fraudulent behavior. Finally, a customer’s identity can be
verified through the use of an electronic credential, such as a digital certificate, issued by
a trusted third party.
AMERICAN BANKERS ASSOCIATION
2
The ABA has recently distributed a resource guide to assist institutions in the
identification and verification of account holders.
Transaction Initiation and Authentication of Existing Customers
Institutions are currently using a variety of methods to authenticate existing customers,
including passwords, PINs, digital certificates and PKI, physical devices such as smart
cards or tokens, and biometrics. Communication of customer responsibilities and
recommended precautions can strengthen the reliability of such authentication methods.
Passwords and PINs: User IDs combined with passwords or PINs are considered a
single-factor authentication technique. The degree of security provided depends on
password secrecy and encryption and on password length and composition. Further,
system configuration settings and password administration should be controlled via an
appropriate security policy.
Digital Certificates and PKI: Due to its complexity and costs, PKI has not been widely
deployed for retail-based electronic banking systems. It is an emerging tool, however, in
the commercial or business-to-business sector.
Physical Devices: Devices such as smart cards or tokens are typically part of a two-factor
authentication process, complemented by a password as the other factor. Authentication
cannot be completed unless the device is present.
Biometrics: A biometric identifier measures an individual’s unique physical
characteristics or behavior and compares it to a stored digital template for authentication.
The identifier can be created from sources such as the individual’s voice, fingerprints,
hand or face geometry, the iris or retina of an eye, or a signature. A biometric identifier
can be used as a single or multifactor process. Although not widely used in banking for
customer authentication in electronic banking applications, biometrics are increasingly
used for physical access control.
Monitoring and Reporting
An effective authentication system should include monitoring or audit features that assist
in the detection of fraud, compromised passwords, and unusual or other unauthorized
activities. The activation, review, and maintenance of audit logs should be standard
control procedures.
Adequate reporting mechanisms, including documentation trails, are needed to promptly
inform security administrators when users are no longer authorized to access a particular
system and to permit the timely and complete removal or suspension of user access
accounts when warranted. The security administrator’s actions should be documented in
activity reports and reviewed by an independent party to provide the needed checks and
balances. If critical systems or processes are outsourced to third parties, clients should
AMERICAN BANKERS ASSOCIATION
3
ensure that the appropriate logging and monitoring procedures are in place and that
suspected unauthorized activities are communicated to clients in a timely manner.
Frequently Asked Questions
1. Are single-factor methods (e.g., passwords) considered adequate for institution
users’ authentication to core processing systems and for customers’ authentication
to electronic banking systems at community banks?
Potentially, yes, depending on appropriate verification during account origination,
prudent system controls and standards relative to password administration, and effective
monitoring and reporting mechanisms. The following system control settings/processes
are considered integral to prudent password administration:
 Industry standards are migrating to the use of passwords with a minimum of 6
characters, comprised of a combination of letters, numbers, and special
characters;
 Locking out users after an excessive number of failed login attempts – industry
practice is generally no more than 5 unsuccessful attempts;
 Establishing risk-based password expiration intervals – industry practice is
migrating toward no greater than 90 days;
 Implementing a secure process for password originations and resets, including
forcing a password change at the next login;
 Preventing use of previously used passwords; and
 Terminating access after a specified interval of inactivity – industry practice is
generally not more than 20 minutes.
2. What guidance should financial institutions be providing to system users with
respect to password generation?
The security provided by a password is directly linked with its confidentiality.
Passwords should never be recorded in writing, nor shared with any other user, and the
use of readily available user identifiers should be strongly discouraged (e.g. the entire or
any part of a user’s Social Security number, birth date, etc.). Additionally, a password
consisting of a word found in the dictionary is subject to a greater risk of compromise
than one consisting of letters, numbers, and/or special characters.
3. Are FFIEC’s authentication guidelines designed to prompt community
institutions to strengthen existing authentication systems?
Yes, in a general sense. Recent examination findings suggest that community institutions
have generally not conducted risk assessments of the information systems deployed
enterprise-wide. Risk assessments and the corresponding determination of appropriate
authentication methods are needed for core application systems, network-based
applications and data, microcomputer-based applications and data, and for all
AMERICAN BANKERS ASSOCIATION
4
product/service delivery channels (e.g., ATMs, telephone banking systems, Internet
banking systems). In addition, risk assessments of all systems must now consider the
privacy and confidentiality of any nonpublic customer information relative to the
Interagency Guidelines for Safekeeping Customer Information.
4. What are some of the key considerations of deploying digital signatures and PKI,
physical devices such as smart cards or tokens, and biometric identifiers as
authentication methodologies?
The FFIEC’s August 2001 guidance document, “Authentication in an Electronic Banking
Environment,” provides a detailed discussion on each of these authentication methods
and their associated control considerations.
AMERICAN BANKERS ASSOCIATION
5
Download