back to article AWS is pushing ahead with MFA for privileged accounts. What that means for you ...

Heads up: Amazon Web Services is pushing ahead with making multi-factor authentication (MFA) mandatory for certain users, and we love to see it. The cloud giant in October said it would start requiring MFA for its customers' most privileged users in 2024. Indeed, we understand that since May this year, AWS has been gradually …

  1. Will Godfrey Silver badge

    So far so good, but...

    if your passkey uses your phone and it gets stolen, is there a fairly quick way to cancel it's authorisation? If so, how do you then gain access to re-authorise another one.

    1. Stu J

      Re: So far so good, but...

      You make sure you've got at least 2 passkeys registered so if you lose one you can still log in and disable the second. If you've only got one phone, then a yubikey or similar can be the second passkey device.

      1. Anonymous Coward
        Anonymous Coward

        Re: So far so good, but...

        I have a work phone with Microsoft Office on it. Whenever I need to sign in on the phone, it prompts me for the MFA by displaying the message on the device and sending the code to the same device. I don't want work things on my private phone so how should I get around this?

        1. Claptrap314 Silver badge
          Linux

          Re: So far so good, but...

          Option #1: Admit that m$ & security have never really been on speaking terms, and respond accordingly.

          Option #2: Inform your work that if they want you to use a phone for work, then they are to supply it.

          These options are not exclusive.

      2. Roland6 Silver badge

        Re: So far so good, but...

        I also recommend setting the access to privilege accounts up in a way that supports transfer. Ie. Make it easier for you to handover to someone else and leave the building , or in these post-Covid enlightened times, permit someone else to pick up your accesses due to your unplanned permanent absence.

        Just taken over the IT of a client where (once again) they used a personal email account for such accesses and also did not use a password manager, so having to go through a spreadsheet (better than photocopies of handwritten notebooks) and changing everything…

        1. Steve Button

          Re: So far so good, but...

          Don't do this.

          If you make it easy to transfer to someone else, you make it easier to transfer to bad actors* and then they have the keys to your whole kingdom.

          Put the passkeys in an envelope in a safe, and put in protocols around who has the keys / combination. And keep it in a secure building. And ideally you'll almost never need to use it, only in an absolute emergency.

          * And I'm not talking about Nicholas Cage.

          1. Roland6 Silver badge

            Re: So far so good, but...

            > Put the passkeys in an envelope in a safe, and put in protocols around who has the keys / combination. And keep it in a secure building.

            In my book, that is making it easier to handover!

            Because you have thought about how someone else, trusted by the organisation, can use the privileged credentials; if you are not around to facilitate the transfer.

            I would hope your thinking would then include the use of non-personal accounts, phones etc. and privileged credential management systems.

            It really is quite scary when you encounter admins who have everything either in their heads, “little black” pocketbook, etc. with recovery to their personal email and phone, and think this is normal and perfectly okay, as they aren’t going be hit by a bus etc… Although this not as scary as the FinDir being the only person with admin access to the financial system…

            1. Arthur the cat Silver badge

              Re: So far so good, but...

              Although this not as scary as the FinDir being the only person with admin access to the financial system…

              If the FD is also always on holiday when the auditors are in, you've got another sort of problem.

              This is based on a friend of mine auditing a firm where exactly that had happened for several years. A later (after the police were involved) conversation with the MD went: "Didn't you suspect anything?" "Well, I did wonder how he could afford a flash new car every year on his salary." Facepalm.

  2. Mike 137 Silver badge

    So far so bad

    "By adding passkey support, AWS customers can now use Apple Touch ID on their iPhones, or Windows Hello on their laptops, as an authenticator – and then use that same passkey as an MFA method to sign in to their AWS console across multiple devices."

    A fundamental for credential security is that no factor is used across multiple devices (or ideally, as in the case of one time codes, even across multiple transactions), for the simple reason that the more places it's used the more likely it is to be compromised. Once again, it seems convenience takes precedence over common sense.

    1. mmccul

      Re: So far so bad

      To be technical, more of concern is that under NIST SP800-63b 5.1.6.1: "Single-factor cryptographic software authenticators SHOULD discourage and SHALL NOT facilitate the cloning of the secret key onto multiple devices." Apple and Google not only do not discourage, they facilitate cloning the secret key (which is all a passkey is) onto multiple devices. It is unclear how Microsoft behaves. I've seen conflicting information there.

  3. Anonymous Coward
    Anonymous Coward

    MFA works well

    ...unless there's a help desk that responds to aggressive, shouty management demanding that their credentials get reset LIKE NOW.

    And unfortunately, in my experience it's the top echelons of management who think that everybody else should abide by strict and unforgiving processes, but as soon as it's them, then different rules apply.

  4. Marty McFly Silver badge
    Thumb Down

    "why not try a passkey?"...

    Avoiding vendor lock-in.

    1. hayzoos

      Re: "why not try a passkey?"...

      Please explain vendor lock-in in regards to passkeys. I am using passkeys and do not see a lock-in in my use of them.

    2. Michael Wojcik Silver badge

      Re: "why not try a passkey?"...

      Because the major passkey implementations are terrible?

      Smartphones are abysmal authenticators. They're fragile (they break, they run out of charge). They're insecure and a tempting target for attackers. They're theft-prone. They're loss-prone, because many people use them all the time and become careless with them. Any authentication based on a smartphone is bad authentication.

      Most passkey implementations are too difficult to back up (and remember that availability is one of the triad). It's a hassle to maintain a second passkey, and many people won't bother. Passkeys don't work well for shared accounts, and there are many good reasons to have shared accounts.

      The most prominent passkey implementations encourage the use of biometrics, and biometrics are always a bad idea.

  5. Missing Semicolon Silver badge

    Non-changeable key

    How secure are these biometric methods? If compromised, I can't change my face!

    1. Michael Wojcik Silver badge

      Re: Non-changeable key

      No biometrics are secure, for reasonable definitions of "secure". Biometrics have poor availability (they're fragile to injury, for example). They don't support delegation. They don't support rekeying, as you noted. They elevate the threat model — I don't know about you, but I'd rather be forced to tell someone a passphrase than be kidnapped so I can unlock a system in person. They have, historically, been rather crap at preventing various forms of credential forgery, and the industry has responded by implementing spot defenses; that is not a good approach.

      Biometrics are authenticators for lazy users. They have no other justification.

    2. Sora2566

      Re: Non-changeable key

      No, but a smartphone-based passkey requires *both* your phone and your face. It's much harder to get both of those.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like