Arynn Crow 

232 Followers
28 Following
64 Posts
Sr. Manager of User Authentication Products at AWS, Board member of the Fido Alliance. Political Science ⏭ Identity & Access Management. Opinions are my dog's.
Twitterhttps://www.twitter.com/@arynncrow

I’m really pleased to share that today, AWS announced we’ll begin requiring the use of MFA in 2024, beginning with the most privileged accounts in our customer environments - the management account root users of AWS Organizations - and expanding throughout 2024.

MFA and strong authentication are so critical, so foundational to security health. It’s increasingly obvious that as digital identity evolves, everyone, everywhere should be using some form of MFA - and if that’s phishing-resistant authentication like #FIDO all the better. As an identity practitioner and as a consumer impacted by the security choices of the companies I do business with, I hope we will continue to see a growing number of companies emphasizing - and yes, requiring - MFA, because it makes a better internet for all of us.

On a personal note: I’ve been at Amazon for ~11 years now, which means I have a pretty big sample size to compare to when I say this is the happiest, most gratifying working day of my life.

https://aws.amazon.com/blogs/security/security-by-design-aws-to-enhance-mfa-requirements-in-2024/

Secure by Design: AWS to enhance MFA requirements in 2024 | Amazon Web Services

Security is our top priority at Amazon Web Services (AWS). To that end, I’m excited to share that AWS is further strengthening the default security posture of our customers’ environments by requiring the use of multi-factor authentication (MFA), beginning with the most privileged users in their accounts. MFA is one of the simplest and most […]

Amazon Web Services
Are you part of a customer support team, or do you work with them semi-regularly? I have questions and want to hear from you!

@boblord often, customer support staff also have access to customer data as it is fundamental to their daily work. There are significant barriers to FIDO authentication for those populations - a few big ones are:

-many organizations contract out support. If you aren’t a giant corporation, you may have limited ability to influence very specific security controls that aren’t already pervasive in the industry. Most contract call centers are providing service for multiple brands simultaneously. They’re often not inclined to change their procedures for the demands of one client unless that client is *the* big client. Even then, the process is very slow.

-their customer relationship management tooling may not support FIDO, or may not allow them to connect external hardware, etc.

-many contract call centers are overseas. Importing security tokens of any kind, but especially security keys, can be challenging. This creates continuous supply chain problems to manage.

-cost. Security keys are still very expensive. Call center turnover is fairly high, adding to operational overhead to manage and replenish keys. (And if these employees are international, point above compounds this)

On top of this, you have all the familiar concerns about ease of use, account recovery, etc. built-in FIDO authenticators leveraging device TPM are useful, but these employees may not have 1:1 workstation assignments, meaning you’d need to provision a key for every one of hundreds of workstations they may use. Now consider again the high turnover. Operational IT nightmare ensues :( and call centers can’t afford downtime.

Passkeys from built-in devices can help change this, but I’m not convinced they’re a full fix at this point. The key to device provisioning remains a challenge, because cell phones and other personal devices that could be used to narrow the number of keys for employees are often banned from the call floor for other security reasons. And the actual computers these employees are using may be cheaper, older devices that may or may not support biometrics, etc.

This is just one population. I don’t think that non-operations groups have much of an excuse, but ops is also one of the biggest groups with access to clear customer data. :)

If you are at #DEFCON do not go to the parties or turn around, we are being evacuated- unclear what’s going on
@aaronpk somewhere in Portland still?
I’ll be at DEFCON Thursday evening - Sunday morning this week - excited to finally get to go for the first time, holler if you’re around and wanna say hello! 👋

@boblord Do you have any favorite examples?

My degrees were in political science. I feel like I still draw a lot of comparisons I learned from social science studies into my work, although it gets harder as the years I’ve spent in tech slowly eclipse the years I spent studying poli sci.

@boblord I can’t help you with a link, and in fact when I tried to find such a video I mostly hit results talking about the controversy of some fire response teams going *back* to private. :)

But I think about this type of move in the context of security frequently. There’s a relative advantage for some services to be managed by governments vs. delegated to private industry. Cybersecurity feels like a clear public interest but the shift of much critical infrastructure to privately held digital enclaves would make that model slow & impossible to scale with public management alone.

Curious what you do with it once you find that video!

People sometimes ask me what I learned while earning my degrees in political science that benefits my career in cybersecurity. The answer is “many things”, but there’s often surprise when I reply with something about writing and forming arguments as one of my top three. But, learning to write strategically and with clarity of purpose is one of the single most useful skills I’ve ever developed; it may also be the one I spend the most time coaching even senior staff on, because it’s deceptively difficult to master.

Think critically about who you’re writing for (and how they think about problems), how to break down complex topics to the right level of detail, and how to order that information into a cohesive narrative arc - all before you start dropping sentences on paper. This makes makes the difference between getting to common understanding, and spending an hour of discussion clarifying whatever underlying message you’re really trying to communicate.

Calling all identity peeps 📢 there’s a couple days left to submit sessions for #identiverse. If you’re not sure if you should submit, it’s a “yes” - and we’re especially interested in hearing from new speakers and folks from underrepresented communities.

Call for proposals here, due Friday:

https://www.abstractscorecard.com/cfp/submit/login.asp?EventKey=RDBGWULG

Submitter Login Page - Call for Identiverse Presentations - Identiverse