Cliche alert—change is the only constant; on that note, threats can keep changing or evolving, and you should be prepared to mitigate them no matter what.
We know that the predefined conditions required by usual authentication methods can become outdated. For instance, legacy authentication —which requires just a username and password to verify access requests, as used by protocols such as POP3 and NTLM—was once the big thing, but unfortunately, it's not only outdated, but you should also be blocking devices using it to access your organization's resources.
While there are modern authentication measures like MFA that are based on predefined policies like conditional access policies, it's trivial to have measures that adapt to risks as they are identified. Here's where adaptive authentication, or risk-based authentication , comes in, enabling you to secure resources while keeping potential risks and threats at bay .
It's important to note that adaptive authentication leverages the Zero Trust approach, and getting access to even your own resources might be a tough nut to crack. It can feel like you're biting the bullet, but you're actually dodging many bullets—known and unknown threats and attacks, not to mention even harmless forms of unauthorized access.
Adaptive authentication closely examines the risk levels of factors of an access request upon login and decides how it must be authenticated. These factors include:
Protecting from unauthorized access and enhancing security are the primary reasons for using different authentication methods. Another reason is preventing risks no one was prepared for, which is why it's also called risk-based authentication and follows the Zero Trust approach.
Let's step back a bit and think. What is the whole point of adaptive authentication, or methods like MFA, per se? To establish a Zero Trust environment. However, there are other reasons you'll want to implement adaptive authentication:
We know adaptive authentication examines the risk levels of a login attempt to decide whether it must be approved and to identify what and how many levels of authentication factors will be required. Doing all of that, of course, takes a few or more steps, and they are:
When a user attempts to access a system or application, the authentication process begins.
Risk-based authentication collects various contextual factors about the login attempt, such as:
The adaptive authentication engine analyzes the collected contextual information to assess the risk level of the login attempt. It compares the current login data with the user's typical behavior, such as when they usually log in and log out, and their patterns with respect to their daily functions or tasks.
Based on the analysis, the system assigns a risk score to the login attempt.
But wait, what is a risk score? It's a number that tells you how malicious or suspicious a login attempt is. It reflects the probability of the attempt being legitimate or potentially breach-worthy.
Using the risk score, the system determines the appropriate level of authentication required:
Now that the authentication method has been decided, the user is prompted to authenticate themselves; this can range from entering one password or passcode to multiple MFA authenticators. That's an exaggeration, but authentication could include MFA and an additional layer of verification, if necessary.
The user's activities during and after the login are continuously monitored to detect any threats or suspicious activities. By doing so, you can avoid and mitigate security incidents as you detect them.