Context and risk aware access control promises to make our industry more likeable. Credit: Thinkstock Two of the leading advances being developed in identity-centric security are sometimes called “context aware” and “risk driven” access control.Context aware access control involves using the attributes of who, what device, from where (location & network) and what data to make real-time decisions about whether or not to authenticate users and permit access to business critical or sensitive data.Risk driven access control goes further to strengthen identity and access management by applying risk concepts and behavior-based trending methods to continuously assess activity during connected sessions and re-authenticate users if necessary.For example, imagine if a company’s top engineer who is developing code for a highly confidential skunk works project decides to spend the day working from a coffee shop in order to power through some serious deliverables. Is this a good idea? From an employee satisfaction and productivity standpoint, maybe so. From a security standpoint, not so much. To understand why, let’s unpack this scenario both from a context and risk perspective.The user (a recognized employee) and device (company-issued laptop with full disk encryption) meet the criteria for access to the corporate network. The location meanwhile (a coffee shop) is not ideal for accessing sensitive corporate data. The local network being used by the device is likely unsecured, and as such is open to vulnerabilities and snooping. The network security risk would be less of a concern if the user were accessing the company network via a secure VPN. In this scenario, the data component is composed of a secure application and information stored in the company’s confidential source code repositories. It’s a bad idea to be accessing and exposing both the source code repository application and the confidential source code trees on a local coffee shop network, even if it’s over a secure VPN and on a fully secured corporate device.This analysis illustrates the myriad of elements that must be considered for users connecting to a corporate network from non-secure locations. While this methodical decision tree will prevent the company’s network and intellectual property from being exposed to security threats, it also torpedoes the engineer’s goal of working in a more productive environment for the day.Given this scenario, are there any alternative measures that could be employed to enable this engineer to safely work in a coffee shop?To answer this question, we need to look at access control through more than just a purely contextual lens, and also consider risk factors. Risk driven access control treats authentication as a continuous stream of events that are under constant evaluation from the beginning to the end of a session.Supplementing the context aware access control model with a risk component requires including behavioral attributes of the user. For example, it might include how quickly and (in)efficiently a user types on the keyboard. Matching current to stored behavioral attributes with an established pattern generates a dynamic risk score.Any deviation from the established pattern would generate a higher risk score and require the user to provide additional authentication data (e.g., enter PIN via text on smartphone) to maintain access to the sensitive application and/or data. If the deviation exceeds pre-established thresholds, access can be completely revoked, requiring the user to reconnect and completely re-authenticate. This is sometimes called behavior-based authentication. Biometric authentication, if available on a device, can also be included as an attribute in the risk score to inform the application on how much access to allow the user. The greatest benefit of this model to the end user is that all of this occurs in real time, with behavioral models being evaluated by a risk engine to constantly determine the user’s authentication score based on a combination of attributes. It enables a seamless and continuous form of connection and authentication to corporate networks, applications and sensitive customer data. Once they have satisfied requisite authentication requirements, users will no longer be required to perform additional attestations or navigate around additional obstacles to gain and maintain access.In this way, context plus risk-driven access control enhances the user experience by allowing employees to focus on their core job functions and not be derailed by having to jump through security speed bumps over and over again. Related content opinion Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult? The transition from an “it’s all about security and protecting the crown jewels” to “we need to mitigate risk and embrace risk management” is a crucial step next step for the information security profession. By Leslie Lambert Dec 17, 2018 4 mins Risk Management Security opinion Securing connected medical devices: Will categorizing them as ICS help? Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats. By Leslie Lambert Oct 04, 2018 4 mins Internet of Things Critical Infrastructure Security opinion Staying secure as the IoT tsunami hits The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. By Leslie Lambert Jul 12, 2018 4 mins Internet of Things Data and Information Security Security opinion The time for network behavior analytics has come Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats. By Leslie Lambert Jun 07, 2018 5 mins Network Security Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe