Farewell to passwords, migration to passwords that transforms business security

Published 6 min de lectura 248 reading

One morning you wake up and realize that you can no longer travel in that old car that took you for years: you spend too much, it sounds weird and no longer inspires confidence. The transition from password-based authentication to a password system follows the same feeling of relief and vertigo: it is an update that improves experience and reduces many risks, but requires planning and some investments in infrastructure and processes.

Passwords have been the dominant form of authentication for decades But the numbers show their limits. Verizon's latest report of data violations indicates that a very high proportion of incidents involve committed credentials, and common practices such as password reuse multiply attack surfaces. Consult sources such as Verizon DBIR 2023 helps understand why change is urgent.

Farewell to passwords, migration to passwords that transforms business security
Image generated with IA.

Passkeys are the modern version of cryptographic keys: instead of memorizing secrets, the user device generates a couple of cryptographic keys, keeping the computer private and recording the public in the service. When the user log in, the service launches a challenge that the device signs with the private key; the server verifies that signature and grants access. This eliminates the classic vector of credentials theft because the private key never leaves the device.

This way of authenticating rests on open standards such as FIDO2 and WebAuthn, and its maturity has driven a rapid adoption: organizations and technology have already reported billions of accounts compatible with passwords. To see adoption data and the boost of the ecosystem, the work of the FIDO Alliance It's a good starting point. In addition, NIST's digital identity guides provide the framework for classifying guarantees (AAL2 / AAL3) and detail how synchronized authenticators fit into an identity program: NIST SP 800-63.

For certified organisations under ISO / IEC 27001, the introduction of passwords is not only a technical decision, but an adaptation of the safety management system. The standard is a map that requires the documentation and justification of controls, risk treatments and operational procedures. In particular, the access control, authentication information management and secure authentication sections should reflect how passwords meet or exceed existing control objectives. Consult the official ISO page on the standard helps maintain the right approach: ISO / IEC 27001 - ISO.

Migration requires explicit risk analysis. In documenting risk treatment, you have to show which threats are removed - such as traditional phishing, the filling of credentials or brute-force attacks - and what new risks appear, for example the loss of devices, supplier units for synchronized passwords or complex recovery scenarios. The auditors will want to see clear procedures for the recovery of accounts, reregistration of keys after incidents and access controls to authentication data.

It is important not to break the solution: the passwords increase safety, but do not make it invulnerable. There are vectors that take advantage of implementation or social engineering failures - for example, degradation attempts that force the return to passwords, or attacks on OAuth flows and device codes - and therefore it is appropriate to rely on practical guides on good implementation; the OWASP project offers useful resources on authentication patterns and associated risks: OWASP Authentication Cheat Sheet.

From the operational point of view, the benefits can be real and quantifiable. Technology companies that have driven the use of passwords report reduced access attempts with stolen credentials, improved login success rate and lower burden for support teams. Microsoft, for example, has detailed its strategy to push the passwords as a default method and operational motives behind that movement: Microsoft Security Blog. In addition, ecosystem analysis shows that adoption improves user experience and reduces costs associated with password rebeginnings.

In terms of compliance, moving to passwords can help to meet multiple regulatory and audit frameworks. The phishing-resistant and categorized authentication at NIST guarantee levels fits with PCI DSS requirements on multifactor authentication, reduces the exposure of personal data in the GDPR context and provides evidence for SOC 2 audits, provided the implementation includes well-defined records, access controls and recovery processes. For references on specific frameworks, it is useful to consult the official pages of each standard, such as the PCI Security Standards Council or information on GDPR.

Operational reality often requires a gradual transition. A business environment can rarely leave the passwords immediately: legalized applications, external suppliers and users who do not have modern hardware create a mixed period. During that time, policies must be documented to explain which systems require passkeys, which tolerate inherited methods and how the principle of lesser privilege is applied to avoid security gaps. Tracability is key: keeping clear records of passwords, changes and use makes it easier to investigate incidents and demonstrate controls to auditors.

Another critical aspect is the recovery of accounts. If a user loses his device and there is no backrest of passwords, the organization must have secure processes to reestablish access without re-introducing attack vectors. The alternatives range from cloud-encrypted recovery codes and backups to manual identity verification procedures; each with its risk implications and operational costs to be described in the SGSI documentation.

For migration to work, business platforms and credentials management solutions should provide solid support for WebAuthn, allow flexible policies by user groups, manage mail checks for recovery where appropriate and generate audit records that show registrations and authentication. The combination of passwords with additional controls - session management, device security requirements and pattern monitoring - maintains the in-depth defense required by a mature organization.

Farewell to passwords, migration to passwords that transforms business security
Image generated with IA.

Where to start? A practical and consistent route with ISO / IEC 27001 is to prioritize by risk: start with the accounts with more privileges and sensitive data, document the reasoning that led to that prioritization and validate the changes with risk analysis and recovery tests. Complementing implementation with staff training reduces friction and helps to detect social engineering attempts to exploit the transition.

In the end, moving to passwords is not a luxury: it is a necessary modernization for many companies that seek to reduce exposure and operating costs without renouncing the user experience. It is not the panacea, but it is a powerful lever to improve the security position if it is accompanied by change management, rigorous documentation and appropriate technical controls. For organisations subject to ISO / IEC 27001 audits, success will not only be achieved by deploying technology: it will be achieved when implementation is reflected in the management system, risk treatment and operational procedures.

If you want to deepen more on adoption of passwords and case studies, the FIDO Alliance notes on adoption growth and sector analysis are recommended reading: FIDO Alliance - Passkey Adoption. To better understand the impact of the credentials committed in security incidents, review Verizon's report: Verizon DBIR 2023. And if your goal is to align migration with good identity practices, the NIST guide is an essential reference: NIST SP 800-63.

Coverage

Related

More news on the same subject.