{"id":8989,"date":"2024-08-30T19:46:10","date_gmt":"2024-08-30T14:16:10","guid":{"rendered":"https:\/\/www.satup.xyz\/index.php\/2024\/08\/30\/strengthening-corporate-wide-authentication-at-adobe-by-renae-kang-aug-2024\/"},"modified":"2024-08-30T19:46:10","modified_gmt":"2024-08-30T14:16:10","slug":"strengthening-corporate-wide-authentication-at-adobe-by-renae-kang-aug-2024","status":"publish","type":"post","link":"https:\/\/www.satup.xyz\/index.php\/2024\/08\/30\/strengthening-corporate-wide-authentication-at-adobe-by-renae-kang-aug-2024\/","title":{"rendered":"Strengthening Corporate-wide Authentication at Adobe | by Renae Kang | Aug, 2024"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<figure class=\"nm nn no np nq nr nj nk paragraph-image\">\n<div role=\"button\" tabindex=\"0\" class=\"ns nt fj nu bh nv\">\n<div class=\"nj nk nl\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" type=\"image\/webp\"\/><source data-testid=\"og\" srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*j5x2p0sfm-heM3X3TwxGsw.jpeg 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\"\/><img fetchpriority=\"high\" alt=\"\" class=\"bh mq nw c\" width=\"700\" height=\"400\" loading=\"eager\" role=\"presentation\"\/><\/picture><\/div>\n<\/div><figcaption class=\"nx ff ny nj nk nz oa bf b bg z du\">Generated with <a class=\"af ih\" href=\"https:\/\/www.adobe.com\/products\/firefly.html\" rel=\"noopener ugc nofollow\" target=\"_blank\">Adobe Firefly<\/a>.<\/figcaption><\/figure>\n<p id=\"a198\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">Over the past decade, phishing attacks have become one of the biggest threats to the security of global organizations. The Anti-Phishing Working Group (APWG) reported <a class=\"af ih\" href=\"https:\/\/apwg.org\/trendsreports\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">more than 4.9 million phishing attacks in 2023<\/a> alone. As the number of attacks increase and evolve in complexity, organizations need to adopt stronger authentication methods that offer greater resistance against these threats.<\/p>\n<p id=\"f8ca\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">This is precisely what Adobe did when we embarked upon a campaign that resulted in our global workforce of 30,000 employees adopting a more secure, phishing-resistant means of authentication.<\/p>\n<h2 id=\"f49c\" class=\"ox oy gu bf oz pa pb dy pc pd pe ea pf ok pg ph pi oo pj pk pl os pm pn po pp bk\"><strong class=\"al\">Establishing Trusted Users and Devices<\/strong><\/h2>\n<p id=\"e53e\" class=\"pw-post-body-paragraph ob oc gu od b hs pq of og hv pr oi oj ok ps om on oo pt oq or os pu ou ov ow gn bk\">Early last year, Adobe Security launched an initiative to identify trusted users and devices across the company. First, we needed to determine what we meant by \u201ctrusted,\u201d which resulted in the following definitions:<\/p>\n<ul class=\"\">\n<li id=\"404b\" class=\"ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow pv pw px bk\"><strong class=\"od gv\">Trusted User<\/strong> \u2014 A verified user with one or more Adobe-managed devices who employs a phishing-resistant authenticator, such as operating system biometrics (e.g., Windows Hello for Business, TouchID, and FaceID) or hardware security keys supporting FIDO2\/WebAuthN.<\/li>\n<li id=\"d761\" class=\"ob oc gu od b hs py of og hv pz oi oj ok qa om on oo qb oq or os qc ou ov ow pv pw px bk\"><strong class=\"od gv\">Trusted Device<\/strong> \u2014 A managed device that is enrolled in Adobe\u2019s unified endpoint management (UEM) tool and complies with the company\u2019s Secure Device Standard to meet specific posture signals \u2014 such as minimum operating system version \u2014 with disk encryption enabled and the endpoint detection and response (EDR) agent installed.<\/li>\n<\/ul>\n<p id=\"a1dc\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">We began by focusing on our full-time employees and interns with Adobe-provided and -managed Windows or Mac laptop and desktop devices enrolled in Adobe\u2019s UEM tool and had EDR installed. With seamless access and visibility into user and device data, we could make the initiative successful.<\/p>\n<h2 id=\"0363\" class=\"ox oy gu bf oz pa pb dy pc pd pe ea pf ok pg ph pi oo pj pk pl os pm pn po pp bk\"><strong class=\"al\">Standardizing on Phishing-Resistant Authentication<\/strong><\/h2>\n<p id=\"e66a\" class=\"pw-post-body-paragraph ob oc gu od b hs pq of og hv pr oi oj ok ps om on oo pt oq or os pu ou ov ow gn bk\">Our corporate identity provider formed the foundation of our phishing-resistant strong authentication program. Together, the multi-factor authentication (MFA) desktop client and phishing-resistant authentication provider help us verify and enforce trusted user requirements. The MFA desktop client provides visibility into device posture compliance, and user enrollment in the authentication provider helps ensure the use of strong, phishing-resistant authenticators, personal verification methods or FIDO2 hardware tokens.<\/p>\n<p id=\"ca01\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">However, we had to overcome an obstacle to fuel user enrollment and adoption. As is oftentimes the case with the rollout of technological improvements, we needed to engage and incentivize our employees to rally behind a new initiative toward stronger authentication. By clearly communicating the benefits of enrolling in a new service, we were able to help our employees prioritize taking action to play their part in Adobe\u2019s goal to adopt all Adobe users before the end of the year.<\/p>\n<h2 id=\"bd8e\" class=\"ox oy gu bf oz pa pb dy pc pd pe ea pf ok pg ph pi oo pj pk pl os pm pn po pp bk\"><strong class=\"al\">The Great Auth Race<\/strong><\/h2>\n<p id=\"5de9\" class=\"pw-post-body-paragraph ob oc gu od b hs pq of og hv pr oi oj ok ps om on oo pt oq or os pu ou ov ow gn bk\">To rally the entire company toward stronger authentication, we launched the Adobe \u201cGreat Auth Race\u201d contest to creatively educate Adobe\u2019s global workforce during the authentication journey. Our security team aimed to promote engagement during the race by encouraging employees to quickly adopt our phishing-resistant authentication provider and educate themselves and others about the importance of the initiative.<\/p>\n<p id=\"bd60\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">Throughout the campaign, we fostered friendly competition among global sites and organizations using leaderboards to track adoption rates. As an added incentive, we offered fun prizes through random drawings for early adopters.<\/p>\n<p id=\"e499\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">To further support the initiative, we created educational infographics that highlighted the importance of preventing phishing and communicated the benefits of adopting a phishing-resistant authentication provider. Maintaining an open line of communication was also a key aspect of this campaign, as we invited employees to provide feedback and share concerns to help continuously improve their enrollment experiences.<\/p>\n<p id=\"c314\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">As a result of the Great Auth Race campaign, we achieved remarkable success within six months, with a 99 percent enrollment in the new phishing-resistant authentication method. This not only created a more secure environment at Adobe but also improved the overall user experience for our employees by providing a more seamless and efficient authentication process with a passwordless setup in place.<\/p>\n<h2 id=\"acaf\" class=\"ox oy gu bf oz pa pb dy pc pd pe ea pf ok pg ph pi oo pj pk pl os pm pn po pp bk\"><strong class=\"al\">Keeping Up with Authentication<\/strong><\/h2>\n<p id=\"892c\" class=\"pw-post-body-paragraph ob oc gu od b hs pq of og hv pr oi oj ok ps om on oo pt oq or os pu ou ov ow gn bk\">The successes of Adobe Security\u2019s strong authentication initiative and deployment of the Great Auth Race has marked a significant milestone in Adobe Security\u2019s ongoing efforts to keep data secure. As Adobe Security continues to enhance our security infrastructure, we remain dedicated to protecting our digital assets and ensuring a secure working environment for Adobe workers.<\/p>\n<p id=\"8265\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">The need to achieve and maintain strong authentication processes is an ongoing evolution. As long as phishing attacks continue to grow more ubiquitous and sophisticated, Adobe\u2019s efforts to secure our systems against them must also grow and expand to match them.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.developer.adobe.com\/strengthening-corporate-wide-authentication-at-adobe-85373594b84d?source=rss----9342990108af---4\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generated with Adobe Firefly. Over the past decade, phishing attacks have become one of the biggest threats to the security of global organizations. The Anti-Phishing Working Group (APWG) reported more than 4.9 million phishing attacks in 2023 alone. As the number of attacks increase and evolve in complexity, organizations need to adopt stronger authentication methods [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8990,"comment_status":"","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[19],"tags":[],"class_list":["post-8989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-graphics-design"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/8989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/comments?post=8989"}],"version-history":[{"count":0,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/8989\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media\/8990"}],"wp:attachment":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media?parent=8989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/categories?post=8989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/tags?post=8989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}