A converged approach to enterprise security

November 2012 Access Control & Identity Management

There is an urgent requirement for organisations to reinforce control over access to their systems.

In terms of managing identity, Applied Identity Control (AIC) is certainly the new kid on the block. Despite the astonishing losses caused by rising incidents of ICT-based crime, organisations are still battling to manage identity throughout their business processes.

Marius Coetzee
Marius Coetzee

From insider fraud and banking scams through to the cyber theft of corporate secrets and customer data, it is clear that there is an urgent requirement for organisations to reinforce control over access to their systems and the activities within them. Enter Applied Identity Control or AIC.

Hi-Tech Security Solutions spoke to Ideco MD, Marius Coetzee, and Mark Eardley of Supervision about the concept of AIC and how it positions identity authentication at the heart of a converged or unified approach to systems-based security.

Mark Eardley
Mark Eardley

The four cornerstones of AIC

The four cornerstones of AIC are authenticate, authorise, audit, automate. According to Eardley, security-conscious organisations whose operations are heavily reliant on ICT will probably already be using established technologies to create competencies in the last three of AIC’s principles. “They will have governing systems in place that are designed to authorise and audit activities. But, almost universally, the integrity of these automated functions is completely undermined by an inability to accurately authenticate users.”

Eardley stresses that the strength of any form of identity management system is based entirely on the accuracy of the authentication component. “If that is weak, the whole structure comes tumbling down. Organisations are so busy looking at the top of the security mountain – where they want to be – that they have not noticed the gaping crevasse at their feet.

“Consequently, a rising number of organisations are falling into that dangerous hole. The Postbank cyber heist of R42m at the start of 2012 is reported to have been based on a failure to authenticate users of the bank’s payment systems. As part of the theft, strong passwords and complex PINs may well have been authenticated, but these things are not people, are they? These credentials can only identify themselves. They do not identify people. In terms of AIC they most certainly do not authenticate.”

The starting point for AIC

Coetzee says, “When we use the word ‘authenticate’ in the context of AIC we are talking about the consistent ability to accurately identify people. Cards, PINs and passwords – or CPPs - do not have this ability. Because their use cannot be restricted to a specific person, they have never been able to authenticate identity.

“So, we say it is quite wrong, that it is absolutely incorrect and also completely misleading to talk about CPPs as being able to authenticate identity. They cannot and they do not.”

Coetzee supports his views by pointing out that the world of physical security recognised this fundamental security flaw many years ago, “For example, many organisations know that fingerprint-based authentication ends the losses caused by people sharing cards and clocking-on for one another. But organisations are perhaps much less aware about what happens when CPPs are exploited by insider fraudsters and cyber villains to access systems and commit their crimes.”

“Failure to authenticate, or FTA, is a fundamental flaw common to all forms of CPP,” says Eardley. “They cannot tell if the user is Jack or Jill. They cannot differentiate between the people using them, which means that they cannot authenticate.”

Eardley sees FTA as such an important concern because of the immense risks it creates in all sorts of IT-based systems and processes. People acquire other people’s CPPs and then access systems and operate within them as if they were authorised users.

“And what is to stop them?” asks Eardley. “If a particular smartcard and PIN is authorised to transfer money from your bank account, then that is exactly what the system allows. The fact that you did not make the transfer is totally irrelevant as far as the system is concerned. The system works. It might not work in the way it was intended to, but it still transfers your money.

“We should not underestimate the enormous losses that organisations are suffering as a direct consequence of FTA. After all, it is the basis for the vast majority of cybercrime.”

For Eardley, that blunt fact warrants some heavy emphasis. “If you think about all the various forms of cybercrime, from having your payment cards and bank account defrauded through to multi-million cyber-heists, almost all of it comes down to someone using someone else’s card, password or PIN. From crooked insiders making illicit EFT payments through to organised villains stealing highly sensitive corporate information, failure to authenticate is leading directly to escalating losses across all sorts of organisations and in all sorts of IT-based systems.”

Overcoming the risks and losses caused by FTA

The consequences of FTA can take many forms. For example, a container-load of goods is delivered to your warehouse. How do you know what was delivered and who took the goods into stock? Some scribbled signatures on a delivery note are not much help when half the stock goes missing before it gets added to your inventory. Or maybe it all gets entered on the inventory but only half actually ends up in the warehouse.

Coetzee says that AIC deals with the who, what, when and where of business transactions: “The ‘who’ bit is clearly really important. Who delivered the goods? Who took them into stock? Who added them to the inventory? Failure to authenticate these identities creates risks and leads directly to recurring losses. FTA leaves the doors wide open for the villains.”

Addressing the challenge of FTA is not difficult. Coetzee points out that for millions of local employees, fingerprint-based authentication systems verify their identities every day as they access the workplace and clock-on to attendance and payroll systems. The whole purpose of fingerprint technology in these systems is to authenticate – to accurately confirm the identities of these employees. Who is where on your premises? Who is authorised to be in that hazardous environment? Who is being recorded by the time and attendance system?

The importance of convergence in AIC

Coetzee says that thousands of SA organisations are using fingerprint-based systems to address each of these questions accurately and securely. He is however adamant that fingerprint authentication can deliver even more commercial benefits: “Who is certified as technically competent and duly authorised to operate that machinery. Who is altering your invoices? Who is making EFT payments and who is reading sensitive documents and making copies?

“If any of these operational functions are controlled by CPPs, then you are fully-exposed to the full spectrum of abuses that arise from FTA. And that leads directly to the escalating losses caused by all the various forms of systems-based crime.”

Beyond applications within physical workforce security, Coetzee sees the integration of fingerprint technology into all of an organisation’s identity-reliant processes as an obvious way to complete the circle in terms using accurate user-authentication as a business tool to reduce risks and prevent losses.

“Systems integration is one of Ideco’s key strengths, giving us the technical capabilities to incorporate fingerprint-based authentication into a diversity of business systems,” says Coetzee. “The business case for fingerprint technology is already well established within physical security systems because it cuts the losses caused by unauthorised access and activity. I would encourage organisations to now start thinking about how to extend that proven success into other areas of their operations.”

Authorise, audit, automate: no problem at all

In Eardley’s opinion, compared to the way we authenticate identity, we really are light-years ahead in terms of how technologies routinely authorise and audit access and activity within commercial processes. “Just consider everything that happens automatically when you use the functionality provided for your online banking. You can move money around your accounts, check transaction histories, make payments and create lists of beneficiaries. You can download proof-of-payment and receive SMS or mail messages concerning activity on your accounts.”

Within corporate IT systems, assigning authorisations and tracking activities is something we take for granted – established, proven technologies just handle it all for us. Want e-mail alerts for exception-reporting? No problem. Want them pushed via SMS. Easy. Want stock-control systems that are linked to sales points? Done it. Want behavioural analysis of activity in your IT system? Got it.

The way we process identity data and what we can do with it seems to be only limited by the objectives we set for these automated functions.

But as long as FTA remains a persistent, recurrent problem within all sorts of business systems, the question Eardley poses is this: why bother with all that expenditure and effort if you cannot authenticate the identity of the people using your systems?



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...