This article explores strategies to safeguard your organization against identity threats, such as account takeovers (ATO) and the evaluation of MFA vulnerability.
- Security
- Account Takeover
Your users are your most important asset —that's why it's critical to provide secure access to apps for both your workforce and customers. Smart organizations have already implemented multi-factor authentication to prevent account takeover. However, not all factors and authenticators provide the same level of security assurance. The classic paradigm for authentication systems identifies three factors as the cornerstones of authentication:
- Knowledge: Something you know (for example, a password)
- Possession: Something you have (for example, an ID badge or a cryptographic key)
- Inherence: Something you inherently are (for example, a fingerprint or other biometric data)
In general, knowledge-based factors are considered weaker than possession or inherence-based ones.
|
Assurance level |
Authenticator |
Pros |
Cons |
| Low | Password |
|
|
| Low | Security Question |
|
|
| Low | SMS, Voice, Email One-time Password (OTP) |
|
|
| Low | Mobile/Desktop One-time Password (OTP) apps Examples: Okta Verify OTP, Google Authenticator, Authy |
|
|
| Medium | Mobile app push notifications Examples: Okta Verify with Push |
|
|
| Medium |
Physical token One-time Password (OTP) |
|
|
| High | Personal Identity Verification (PIV)/ Common Access Card (CAC) smart cards |
|
|
| High | FIDO2.0 / WebAuthn and CTAP2 Examples: Mac Touch ID, Android fingerprint, Windows Hello, YubiKey |
|
|
| High | Okta FastPass |
|
|
Advice on better securing against account takeover
1. Phishing-resistant factors
Consider transitioning to more secure authentication methods, initially with number challenge. The end game would be phishing-resistant methods, like Okta FastPass.
A first step is transitioning from push notification to number challenge. Security analysis has shown that compared to push challenge, number challenges account takeovers rarely happen. Initially, you can enable it for "high risk" challenges and afterwards transition to "all push challenges".
Resource: What Triggers Number Challenge in Okta Verify
Afterwards, when moving to phishing-resistant factors, you can start testing with a small group and gradually expand, especially for applications with sensitive data. A gradual roll-out is recommended to ensure a clear understanding of the effects and impact it will have on your users. In some scenarios, we can discuss device limitations that cannot use FastPass. Here, we can consider YubiKey as an alternative.
Resource: Phishing-resistant authentication
2. Network Zone configuration
A first step here would be to block Anonymizing proxies. An active block ensures that any request incoming from an anonymizing proxy will translate into a 403 Forbidden result to any endpoint of your organization. Please be aware that this will also block legitimate users if they are using an anonymizing proxy to access your tenant. An example is Apple devices with Private Relay enabled, where users will need to disable Private Relay when accessing your organization. You can allowlist certain anonymizers with enhanced dynamic zones.
We also highly recommend blocking countries and ASNs. A country block from regions where you do not have active users will greatly limit possible malicious actor attempts. We suggest leveraging the "Enhanced Dynamic Zone" that offers better granularity compared to "Dynamic Zone".
Resource: Enhanced dynamic zones
Even when specific blocklists are in place, if you have users traveling abroad to a zone that you have in a blocklist, you can still allow those users access by adding their IPs to the Exempt Zone. The default IP Exempt Zone bypasses any blocklist that you have in place.
Resource: How to Allowlist an IP Blocked by Network Zones
3. Identity Threat Protection
Consider adopting ITP (Identity Threat Protection) for the Okta Threat Intelligence and other detections, and enabling Universal Logout. This feature is highly efficient at detecting session hijacking, and "Universal Logout" ensures that your users are logged out of Okta and third-party apps that are linked to Okta.
Resource: Identity Threat Protection
4. Automations for your own threat detection tool
First, you will need to create your log streaming service from Okta. Afterwards, review the Okta detections repository and create automations in your SIEM to notify your SecOps team to investigate suspicious behavior.
Resources:
- Log Streaming
- Add Splunk Log Stream
- Okta Customer Detection Repository: GitHub - okta/customer-
- Auth0 Customer Detection Catalog: GitHub - auth0/auth0-customer-detections
