How CA Arcot Solutions Protect Against Internet Threats



Similar documents
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks

How To Comply With Ffiec

Strong Authentication for Secure VPN Access

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

CA Arcot RiskFort. Overview. Benefits

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Entrust IdentityGuard

STRONGER AUTHENTICATION for CA SiteMinder

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

Adding Stronger Authentication to your Portal and Cloud Apps

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

Advanced Authentication Methods: Software vs. Hardware

CA VPN Client. User Guide for Windows

Closing the Biggest Security Hole in Web Application Delivery

ADDING STRONGER AUTHENTICATION for VPN Access Control

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

expanding web single sign-on to cloud and mobile environments agility made possible

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Authentication Strategy: Balancing Security and Convenience

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Designing a CA Single Sign-On Architecture for Enhanced Security

A Security Survey of Strong Authentication Technologies

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Swivel Multi-factor Authentication

SafeNet Authentication Service

Guide to Evaluating Multi-Factor Authentication Solutions

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Using Entrust certificates with VPN

SOLUTION BRIEF CA ADVANCED AUTHENTICATION. How can I provide effective authentication for employees in a convenient and cost-effective manner?

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

CA Service Desk Manager - Mobile Enabler 2.0

CA Nimsoft Service Desk

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

CA Performance Center

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

CA Spectrum and CA Embedded Entitlements Manager

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

HOTPin Integration Guide: DirectAccess

how can I improve performance of my customer service level agreements while reducing cost?

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

White Paper: Multi-Factor Authentication Platform

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Electronic Fraud Awareness Advisory

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Protect Your Business and Customers from Online Fraud

The Key to Secure Online Financial Transactions

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

Managed Services PKI 60-day Trial Quick Start Guide

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

IBM Client Security Solutions. Client Security User's Guide

Entrust. Entrust IdentityGuard 8.1. Deployment Guide. Document issue: 2.0. Date of Issue: April 2007

RSA Solution Brief. RSA Adaptive Authentication. Balancing Risk, Cost and Convenience

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

agility made possible

Ciphermail Gateway PDF Encryption Setup Guide

CA Cloud Service Delivery Platform

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

CA Unified Infrastructure Management Server

Improving Online Security with Strong, Personalized User Authentication

BlackShield ID Agent for Remote Web Workplace

Vidder PrecisionAccess

Portal Administration. Administrator Guide

CA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series

Secure Web Access Solution

Welcome Guide for MP-1 Token for Microsoft Windows

Endpoint Security VPN for Windows 32-bit/64-bit

Secure Data Exchange Solution

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

A brief on Two-Factor Authentication

Global Bank Achieves Significant Savings and Increased Transaction Volume with Zero-Touch Authentication

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Strong Authentication for Microsoft SharePoint

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

DIGIPASS as a Service. Google Apps Integration

CA SiteMinder SSO Agents for ERP Systems

IDRBT Working Paper No. 11 Authentication factors for Internet banking

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

ACI Response to FFIEC Guidance

TrustKey Tool User Manual

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Salesforce1 Mobile Security Guide

SafeNet Authentication Service

PROXKey Tool User Manual

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Transcription:

TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can

table of contents executive summary 3 SECTION 1: CA ArcotID Security 4 Table 1: Threats and How CA ArcotID Defeats Them 5 Table 3: Comparison Between CA ArcotID and Other Authentication Technologies 9 Table 4: Comparison Between CA ArcotID and PKI Based Authentication 10 Table 2: Features and Benefits 6 2

executive summary Summary Regulatory requirements are making strong authentication mandatory. Simple username and password login processes are no longer sufficient. Traditional approaches like OTP tokens are expensive to deploy and manage and are ineffective against some threats. The challenge you face is deploying a technology that is both easy to use and strong enough to protect against sophisticated attacks like Man-in-the- Browser and Man-in-the-Middle. CA Arcot offers a wide range of software only, multi-factor, and two-factor authentication solutions that transparently protect and verify your Web users identities. CA Arcot Solutions help protect your customers, partners, and employees from identity theft and fraud without the need to change their familiar login experience. By employing innovative, patented authentication technologies, CA Arcot solutions uniquely defeat attacks like Man-in-the-Middle and Man-in-the-Browser which can evade other authentication technologies. Basic adaptive access control including fraud monitoring, detection and prevention capabilities are provided by CA Arcot RiskFort. CA Arcot RiskFort employs real time risk-based authentication technologies such as deviceid checking and IP Geolocation to identify legitimate users. If a user is deemed suspicious, the transaction or login can be denied or can be flagged for additional step up authentication. CA Arcot WebFort provides a range of multi-factor authentication options including Security Questions & Answers, OTP to mobile phone via SMS, OTP via email and the CA ArcotID Secure Software Credential. CA Arcot WebFort also includes a Personal Assurance Message for site verification and a scrambled pin pad to protect against keystroke and mouse click loggers. CA Arcot authentication solutions are offered for deployment on-premise or on-demand as a CA Arcot hosted service called A-OK On-Demand. You choose the deployment model to suit your environment. 3

CA ArcotID Security The CA ArcotID is a secure software credential that combines protection for digital identities like that of a hardware smart card with ease of use, ease of distribution, and lower costs for deployment and maintenance. The CA ArcotID is the something you have and the CA ArcotID password is the something you know necessary for two-factor authentication. The CA ArcotID can reside on the local desktop, PDA, or can be carried in any persistent memory device, such as a USB memory stick. The CA ArcotID resists brute force attacks using patented Cryptographic Camouflage technology to protect a user s digital ID from attackers. The technology has been vetted by academics 1 and Fortune 500 companies. Organizations can use the CA ArcotID for two-factor challenge/response-based authentication, and for securely storing extra application keys. The CA ArcotID can also store other user data for additional applications such as electronic document signing, secure email and e-document delivery. As a software-based solution, the CA ArcotID enables organizations to leverage the advantages of Public-Key Infrastructures without the expense and management issues inherent with hardware-based secure key storage. The CA ArcotID authenticates with the authentication server as follows: The authentication server first sends a hidden challenge (a random string of text) to the CA ArcotID. When the user provides the correct password to the CA ArcotID, the CA ArcotID uses the private key to sign this challenge to create the corresponding response. Only this response is sent back to the authentication server for verification. The CA ArcotID does not store the password used to derive the private key anywhere, or transmit it to the server. By providing the challenge/response sequence in addition to multi-factor authentication, CA Arcot can protect businesses and customers from Man-in-the-Middle attacks. The CA ArcotID also features an easy-to-use and familiar username/password interface and integrates quickly with existing authentication infrastructures with support for standards such as RADIUS-based OTP, SAML, MS CSP and PKCS#11. This can make deployments fast and easy for an organization to implement and its customers to use. CA Arcot has also developed a patented technology to protect PIN/password entry from keyboard capture attacks. This optional Scrambled Pin-pad defeats keyboard sniffers by requiring the user to click the digits of their personal PIN on a virtual keyboard. Organizations can configure the virtual keyboard to scramble the keys after each mouse click or each password entry, thus preventing the malware from reading any keystrokes or making pattern guesses based on mouse click locations. The CA ArcotID provides protection against common internet attacks and several new attacks that are becoming popular among fraudsters. Other solutions, including one-time-password (OTP) generator tokens, do not offer the same level of protection against attacks such as Man-in-the-Middle attack. The following table contains a list of known threats and shows how CA Arcot defeats those attacks. 1 See Software Smart Cards via Cryptographic Camouflage, D.N. Hoover and B. N. Kausik, Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society 4

Table 1: Threats and How CA Arcot Defeats Them Threat Description How CA Arcot Defeats the THREAT Brute Force Challenge/ Response Intercept The attacker copies the key container to his own equipment and exhaustively attempts millions of passwords, which eventually leads to the disclosure of the private key. The attacker intercepts the challenge issued by the authentication server and the signed response from the client. The attacker then uses every possible private key to recreate the signed response and discover the true private key. CA Arcot s patented Cryptographic Camouflage technology uses a password as a basis for encrypting the private key. It uses standard encryption algorithms and the patented CA Arcot process to protect the key. The result of this process is that any decryption attempt, including using an incorrect password, will always produce a result that meets the specific, particular, and well-documented characteristics of a private key. A six-character password will have approximately 56.8 billion permutations (upper case, lower case, and numbers), and only one of those permutations will unlock the private key. During the authentication process, the authentication server requires the decrypted key to generate a response by digitally signing the authentication challenge it issued. If the authentication fails because an incorrect key was used to generate the response, the invalid password counter increases by one. The authentication server can block user access after a configurable number of invalid attempts (the default is three. Therefore, the attacker can attempt very few passwords before being locked out. The authentication challenge/response is sent over a secure SSL channel. Even if an attacker were able to break the channel security which is extremely unlikely this attack still fails because the standard signature algorithm always includes random padding to ensure the uniqueness of every signed response. Only the authorized authentication server, which has access to the corresponding public key, can verify the signature. 5

Table 2: Features and Benefits Threat Description How CA Arcot Defeats the THREAT Chosen Plaintext Fraudulent Administrator Man-in-the- Browser The attacker tests every possible key against a known piece of text that has been encrypted with the public key and can tell when he has discovered the true private key as it would correctly decrypt the plaintext. The attacker is a fraudulent administrator who gets access to the CA ArcotID on the server. The attacker uses malware, typically a trojan, to modify a user s transactions in real-time. Unlike other phishing attacks, there is no change to the URL with which the user authenticates. The attack piggybacks on a legitimate session after the user has authenticated himself via single- or multi-factor authentication. CA Arcot s optional patented scrambled PIN Pad thwarts logging malware. The PIN Pad is a virtual keyboard that shows up on the screen; users enter their password by clicking with a mouse on a screen-based key pad. The user will not use the keyboard to enter the CA ArcotID password and is hence protected from keyboard loggers. The scrambled PIN Pad ensures that mouse click loggers are unable to determine what keys are actually pressed by optionally changing the position sequence of the keys on the PIN Pad after every click. Custom VPN clients, internally developed applications using CA Arcot API, CA Arcot web server plug-ins. CA Arcot defeats Man-in-the-Browser by validating the integrity of the data in a transaction, as well as providing in-band authentication of the transaction itself. CA Arcot incorporates two unique approaches to defeating MITB attacks: Digital Signing of Forms: CA Arcot s approach leverages the ubiquitous Adobe Reader/Acrobat client, with its embedded CA Arcot technology. Because the transaction occurs completely in the Adobe Reader/ Acrobat environment, it is completely separate from any browser-based trojan or helper application. Upon initiating a transaction, the user is presented with a PDF-based form, into which he enters all transaction details. The user then submits the form, causing the Adobe client to invoke the embedded CA ArcotID client. The CA ArcotID authenticates the user and digitally signs the PDF, allowing the server to complete the transaction. The form data is never exposed to a MITB as it takes place outside of a browser environment. Virtual Private Session (VPS): CA Arcot s patent-pending VPS creates a virtual session with the end-user. The VPS exposes any changes in the transaction made by malware in the browser, or any browser helper objects. CA Arcot VPS presents details of the transaction along with a Transaction Confirmation Code back to the user in a CAPTCHA format in the same web channel. This approach does not depend on alternate channels or back-end analysis. The user reads the CAPTCHA, verifies the transaction details, and enters the confirmation code to confirm the transaction within a specific time period. The MITB Trojan is generally unable to parse the CAPTCHA and read the Transaction Confirmation Code within the time available. If the MITB has modified the transaction, the CAPTCHA image will show the modified transaction in its entirety. The user can easily detect a change from what was originally entered and can stop the transaction and prevent the MITB attack. 6

Table 2: Features and Benefits Threat Description How CA Arcot Defeats the THREAT Man-in-the- Middle Pharming Phishing Replay Attack The attacker intercepts the credentials and data while they are in transit. In this case, the attacker appears as the target server to the user and as the user to the target server. The attacker poisons the DNS server and redirects users to the fraudulent web site. Users do not suspect anything because the redirect happens even when the user selects the web site from a saved favorite or actually types in the correct URL. The attacker targets users and fools them into entering their credentials into a fake web site. This usually occurs when a criminal sends an email impersonating a customer service organization from a legitimate business (such as a bank or payment site) and asks recipients to click on a URL to perform account maintenance or verification. The link takes them to a fraudulent site, which prompts them for their valid credentials. The attacker stores a copy of the signed challenge and replays it to the site. Each CA ArcotID contains information about the domain that issued it. The CA ArcotID client automatically checks the CA Arcot certificate to confirm that it is connected to the same domain before signing the challenge response. If the domains do not match, the CA ArcotID client will not sign the challenge and the attacker will not be able to complete the authentication. As mentioned above, each CA ArcotID contains information on the domain that issued that CA ArcotID. The CA ArcotID client automatically checks to confirm that it is connected, via SSL, to the right domain before signing the challenge string. If the domains do not match, the CA ArcotID client will not sign the challenge and the attacker will not be able to complete the authentication. One key advantage of the CA ArcotID s two-factor authentication is to protect users from phishing attacks. Again, assuming phishers can convince a user to disclose their password, they are still unable to impersonate the user as they don t have the second factor (the CA ArcotID). The phisher needs both what the user has (the CA ArcotID file) and what the user knows (the Password). CA Arcot also provides protection against phishing attack even when two-factor authentication is not used: 1. A Risk Engine (RiskFort) to determine if the user is coming from a registered device, geographical location, or other predetermined check. The engine can recommend an out-of-band check if necessary. 2. A shared secret that the user establishes with the application server Personal Assurance Message (PAM). The site prompts the user for his user ID only. After the user enters his user ID, the site displays the PAM if the risk engine is confident with the checking result. The user can make sure he is not communicating to a phishing site before he enters his password. The CA Arcot authentication involves a PKI-based challenge/ response model where the challenge sent to the client for signing is a freshly generated random block. When the signed challenge is sent to the server for verification, the server verifies the challenge and marks the particular signed challenge as having been verified. The uniqueness of the random challenge defeats the replay attacks. 7

Table 2: Features and Benefits Threat Description How CA Arcot Defeats the THREAT Key-Logger Malware Browser Memory Attack The attacker installs key-logging malware that captures every keystroke and mouse click on the computer and periodically sends that information over the internet to the criminal who created it. The attacker attempts to find the private key in the memory of a system that has downloaded the CA ArcotID in roaming mode when the user does not close the browser (such as at a public Internet kiosk). CA Arcot s optional patented scrambled PIN Pad thwarts logging malware. The PIN Pad is a virtual keyboard that shows up on the screen; users enter their password by clicking with a mouse on a screen-based key pad. The user will not use the keyboard to enter the CA ArcotID password and is hence protected from keyboard loggers. The scrambled PIN Pad ensures that mouse click loggers are unable to determine what keys are actually pressed by optionally changing the position sequence of the keys on the PIN Pad after every click. When the CA ArcotID is downloaded into memory, the private key is still camouflaged it is not in the clear. The private key appears only briefly when the challenge is signed and the user provides the password. Immediately after signing the challenge, the private key and password are cleared from memory; only the response (encrypted challenge) is sent back to the server the CA ArcotID never sends the private key and password to the server. Even if the user does not close the browser, only the protected CA ArcotID may be in memory. The web page that downloaded the CA ArcotID can also remove it from memory by clearing the memory immediately after the authentication. Table 3: Comparison Betweet CA ArcotID and Other Authentication Technologies Man- in-the- Browser Man- in-the- Middle Pharming Phishing Replay Attack Key- Logger CA ArcotID 4 4 4 4 4 4 OTP HW Token m 4 4 m Risk Analysis m m m m Personal Assurance m 4 m m Virtual Keyboard n/a n/a n/a n/a 4 Identifying Questions m 4 4 4 m Out of Band m 4 4 4 m Split Key m 4 4 4 m Scratch Cards m 4 4 m m Legend: 4 = Full protection; m = Partial protection; = No protection 8

Table 4: Comparison Between Ca Arcotid and Pki Based Authentication Brute Force Fraudulent Admin Challenge/ Response Intercept Chosen Plaintext Malware Browser Memory Attack CA ArcotID 4 4 4 4 4 Split Key 4 4 m m m Client SSL Certificate m m Plain Certificate m Legend: 4 = Full protection; m = Partial protection; = No protection CA Technologies is an IT management software and solutions company with expertise across all IT environments from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 rely on CA Technologies to manage their evolving IT ecosystems. For additional information, visit CA Technologies at ca.com. Copyright 2011 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages.ca does not provide legal advice. Neither this document nor any software product referenced herein serves as a substitute for your compliance with any laws (including but not limited to any act, statute, regulation, rule, directive, standard, policy, administrative order, executive order, and so on (collectively, Laws ) referenced herein or any contract obligations with any third parties. You should consult with competent legal counsel regarding any such Laws or contract obligations.