Podcast
Root Causes 215: Passwordless Authentication and Legacy Systems


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 8, 2022
Organizations seeking to use passwordless authentication frequently must deal with legacy systems that cannot support this scheme. In this episode we explain why that occurs and detail the steps organizations can take to mitigate the effect of legacy systems.
Podcast Transcript
Lightly edited for flow and brevity.
That's the argument I'm trying to make. And let's now move to what probably what's a more, even a more common scenario, which is, Tim, you and I lived through, we are just so old, so old, that you and I remember monolithic enterprise systems that typically were installed in big computers in the server room and they were very much like a mainframe in that you can't change them. Like, the only way in was to network to them and to authenticate through username and password and there's no configurability because the people who design that system are probably either retired, or in different stages of their life and there's just no way to be able to take an old human resources system or a finance system back from the mid 90s, and turn it into a fancy-dancy strong authentication type of system. There's only one way in and that's your username and password.
I'm gonna categorize this and I think we spoke about this on a previous podcast. This is about essentially what is a password manager on steroids, which is going to be an agent on your employee’s laptops, their workstations, perhaps even their Android or iOS devices, which says, alright, you want to log into ancient finance system X. What you're going to have to do then is go through a biometric and then perhaps there's a key pair associated with that and then what I'm going to do as your agent, is I'm going to log in with a username and password underneath, but you don't have to key in that username and password.
That's essentially what's happening. I'd like to consider that a password manager on steroids because it's not typically the password manager that you all know and love which is you open up your password manager and about to log in to something, I can copy and paste the password and I can paste the password into whatever website or application that I'm trying to log into. This is not what we're referring to. This is something that fully abstracts away the username and password authentication experience away from the user, which is a positive experience. And so what's the security aspect to this, Tim? The security aspect is alright, there's perhaps less chance of social engineering.
But number two, (b) I think it's important to then ask yourself, can I isolate these systems? Because what used to be very common, Tim, is, you know that HR system, that legacy finance system, were just sitting in the server room and my ability to address those servers was, hey, if I'm on the corporate network, I can probably address those servers. In other words, I can start issuing an authentication command to those servers, as long as I have access to the enterprise network. Very flat networks. Those systems are right at the surface of that flatness. So I think my way of thinking about it is get your networking people to consider is there a way to isolate those systems? By isolating, I mean, alright, should I be able or should I, should I be forced to authenticate to something else before I get to that specific server, and I use very generic terms there, Tim, because there's a lot of ways of doing that.
Depending on what the server or application is, you may or may not be able to do certain kinds of things. Or it may be so onerous to the user, that you would choose not to do that. All I'm saying is this - if you put that vulnerable system to a different segment of the network, and force stronger authentication to that portion of the network, you might be adding a layer of security that's very useful. In other words, the problem of the flat network is a major issue in why the bad guy is able to get into that system so easily. In other words, make it harder and use stronger forms of authentication in a different way. I think that one of the methodologies that might be quite common is hey, like, in other words, put it on its own network and VPN into that network with a strong form of authentication. That may be a way of doing that.
Therefore, I cannot isolate this system. That's the worst case scenario, to me. From the real challenge of if you're a cybersecurity specific employee at this organization, you've probably had very harsh conversations with the people whose lives are dedicated to keeping these systems up and running and available and just interoperable and, these people are, they don't, they absolutely do not want to be considered second class citizens and what they're doing is very important, but you, as the cybersecurity professional, you've probably now no longer have gray hair, you have no hair, because you realize just how vulnerable this system is.
And that's because I can do a whole podcast about how they have failed, how they have been just bypassed, and frankly, they're problematic. However, however - I'm resisting the urge to go through examples right now. Oh, by the way, did you know that Okta, that third party that got hacked recently, that was in the news and we did a podcast on that, their monitoring system, which I believe was FireEye, was merely turned off by the attacker. So there you go. There’s my example. I scratched the itch. I'm good now, Tim. I'm good.
What I am saying here, Tim, is maybe this is enter stage right monitoring systems. In other words, if you have a legacy system that has very weak authentication, and you cannot isolate it on a network, then that's your ideal scenario for ok, I'm going to have an extremely focused monitoring system, because that legacy system probably is the ideal monitoring system use case which means, Tim, it has very, very limited usability. In other words, very few people log into it at very specific times in very specific contexts. Well, guess what? That's the perfect world for a monitoring system because you can apply those rules and if you happen to see any of those rules being broken or a context is not right, well, that monitoring system can flag that to you. Of course, you end up with the risk of false positives and all the reasons why monitoring systems to me are quite problematic but they can be an important layer for a system like that.
You might leave around on a file system somewhere, somewhere where if a bad guy got this file, you're already hosed. But if you were to say, call the file, something like, I don't know, passwords list.txt, and put in, Joe Admin and a password to a finance system, and name the finance system, whatever it is.

