assurance - RE: [Assurance] silver, 2-factor, password requirements
Subject: Assurance
List archive
- From: "Jones, Mark B" <>
- To: "" <>
- Subject: RE: [Assurance] silver, 2-factor, password requirements
- Date: Thu, 29 Nov 2012 22:00:34 -0600
- Accept-language: en-US
- Acceptlanguage: en-US
So it sounds like you have determined that NIST LoA 2 / Silver is not
sufficient, but you seem reluctant to fully embrace LoA 3.
The risk assessment seems to closely follow NIST guidance. Why not embrace
LoA 3 as defined by 800-63?
-----Original Message-----
From:
[mailto:]
On Behalf Of Tom Scavo
Sent: Thursday, November 29, 2012 9:39 PM
To:
Subject: Re: [Assurance] silver, 2-factor, password requirements
> The risk assessment concludes that the "Federation Manager is a
> moderate-impact system" and it references the "Potential Impact
> Categories for Authentication Errors" table from OMB M-04-04, but does
> not say which LoA was identified. It looks to me that
> "moderate-impact" could land it in LoA 2 or LoA 3 depending on which
> risk categories earned the system as a whole the moderate-impact
> designation. Did a "required LoA" result from this risk assessment?
Thanks for reading through this, Mark. There are probably as many
interpretations of the risk assessment as there are readers. That said, focus
for a moment on the first row in the table where the impact level is "equal
to the impact level of the IdP's highest assurance profile." In other words,
the entire trust fabric of the Federation depends on the integrity of the IdP
signing certificates in metadata. Doesn't matter how much effort participants
put into their IdP deployments, if a bad guy can impersonate one of your site
admins, it's game over.
I conclude from that simple analysis that we not only need two-factor
authentication but we also need other compensating controls as well, at least
for high-risk elements in metadata (such as IdP certificates and endpoints).
Tom
- Re: [Assurance] silver, 2-factor, password requirements, (continued)
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/28/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/28/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/28/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/28/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/29/2012
- Re: [Assurance] silver, 2-factor, password requirements, Cantor, Scott, 11/29/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/29/2012
- Re: [Assurance] silver, 2-factor, password requirements, Cantor, Scott, 11/29/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/28/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/29/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/29/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/29/2012
- Re: [Assurance] silver, 2-factor, password requirements, Michael R. Gettes, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Farmer, Jacob, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Barton, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Cantor, Scott, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Cantor, Scott, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Cantor, Scott, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/28/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/28/2012
Archive powered by MHonArc 2.6.16.