S 4.133 Appropriate choice of authentication mechanisms

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The identification and authentication mechanisms of IT systems and/or IT applications must be designed in such a manner that users are clearly identified and authenticated. Identification and authentication must be carried out prior to any other interaction between the IT system and users. Any further interactions may only be possible following successful identification and authentication. The authentication information must be stored in such a manner that only authorised users can access them (can check or modify them). For each interaction, the IT system must be able to determine the user's identity.

Prior to the transmission of user data, the communication partner (computer, process or user) must have been clearly identified and authenticated. Only after successful identification and authentication may the user data be transmitted. When receiving data, it must be possible to clearly identify and authenticate its sender. All authentication data must be protected against unauthorised access and falsification.

There are different techniques by means of which the authenticity of a user can be verified. The best-known techniques are the following:

For fields of application critical to security, strong authentication mechanisms should be used; here, two authentication techniques are combined, for example password plus transaction numbers (one-time passwords) or password plus chip card. For this reason, strong authentication is also often referred to as two-factor authentication. Both authentication techniques used must conform to the current state of the art.

In the following, different criteria are shown which should be taken into consideration when choosing identification and authentication mechanisms. Not all systems available on the market meet all criteria, which should be taken into consideration accordingly when choosing authentication mechanisms. In addition to their actual functionality, many IT products also contain authentication mechanisms, for example operating systems. Here, it must be examined whether they meet the requirements or whether they must be extended by additional functionalities. The following criteria are also suitable in this respect.

Authentication data administration

Security functions must be available to be able to create and modify authentication data for the users. These functions should only be carried out by authorised administrators. When using passwords, authorised users should be able to change their own authentication data within defined limits. The IT system should provide a protected mechanism to ensure that the users can change their passwords independently. Here, it should be possible to specify a minimum service life for passwords.

Following a successful login, time and place of their last successful access should be displayed to the users.

Protecting the authentication data against modification

When processing the data, the IT system must protect the authentication data at all times against espionage, modification and destruction. For example, this protection can be ensured by encrypting the password files and not displaying the entered passwords. The authentication data must be stored separately from the application data.

System support

When using organisation-wide authentication procedures, they should only be operated on servers whose operating system offers adequate protection against manipulations. When choosing authentication procedures, it should be ensured that they can be used across platforms as far as possible.

Error handling during authentication

It should be possible for the IT system to terminate login procedures after a specified number of unsuccessful authentication attempts. Following an unsuccessful login procedure, the IT system must be able to lock the user account and/or the terminal and/or disconnect the connection. After unsuccessful authentication attempts, the IT system should increasingly delay any further login attempt (time delay). It should be possible to limit the maximum duration of a login attempt.

User data administration

The IT system should offer the possibility of being able to assign different default settings to the users. It should be possible to display and change these settings. The possibility to modify user data must be limited to the authorised administrator. If the administration of the user data is to be carried out via a communication connection, such connection must be secured adequately as regards cryptographic protection.

Defining user entries

The IT system must allow the implementation of the security policy, ensuring that the corresponding security settings can be selected for each user.

It should also be possible to extend an authentication procedure, e.g. by the support of strong authentication techniques such as the use of tokens or chip cards (see also S 5.34 Use of one-time passwords).

Scope of user data

In addition to the user names and rights profile, additional information on each user should be stored (see also S 2.30 Provisions governing the configuration of users / user groups):

Password quality

When passwords are to be used for authentication, the IT system should offer mechanisms meeting the following requirements (see S 2.11 Provisions governing the use of passwords):

Biometrics

Within the meaning used in this document, biometrics refers to the automated recognition and identification of persons based on their physical characteristics. To be able to use biometric procedures for authentication, additional peripheral devices by means of which the users can be clearly authenticated based on special characteristics are required. One or more of the following biometric characteristics can be used for authentication purposes, for example:

In addition to numerous biometric characteristics and biometric procedures based on these characteristics, there are also huge differences between the specific biometric systems and products available. There are huge differences between the performance capabilities of biometric verification systems. When using biometric verification systems in security-critical areas, it must be ensured that they provide an acceptable recognition capability and a high level of security. It must not be possible for this system to be outwitted by means of replicas (e.g. using a face mask, wax replica of the finger, contact lenses with iris patterns...).

Authentication using tokens

Another alternative are authentication tokens, i.e. handy data media that are used as secure storage space for the information required for authentication such as cryptographic keys. Typical examples of authentication tokens are chip cards, USB sticks or devices similar to calculators to generate one-time passwords.

Requirements for user authentication mechanisms

Prior to any other user transaction, the IT system must check the user identity. In addition to this, the IT system should detect the restoration of authentication data for users or be able to prevent falsified or copied user authentication data from being installed. The IT system may only check the authentication data after they have been entered completely.

Each user should be able to individually adjust when and from where they may access the IT system.

Logging the authentication mechanisms

Authentication processes must be logged to a reasonable extent. The log files should be checked by the administrators at regular intervals. The IT system must be able to log the following events:

Each log entry should contain date, time, type of the event, designation of the subject as well as success or failure of the action.

Review questions: