FB pixel

Google commits to more MFA and passkeys

Details alignment with CISA’s Secure by Design Pledge
Google commits to more MFA and passkeys
 

Google is committing to multi-factor authentication as a central pillar in its cybersecurity strategy for consumers and enterprises, with passkeys as one of its main tools for strengthening account security. The Department of Homeland Security’s cybersecurity agency surely approves, as Google’s commitments follow both its recent and newly published guidance.

The tech giant has enumerated seven ways it is implementing the Secure by Design Pledge. The Pledge was formulated by the U.S. Cybersecurity & Infrastructure Security Agency (CISA) earlier this year, and Google is one of more than 200 signatories, according to the blog post.

A white paper describing “An Overview of Google’s Commitment to Secure by Design” provides details.

MFA is prominent among Google’s measures, including its shift towards passkeys for passwordless authentication. Default passwords are not treated by the company as a vulnerability, and are not pre-configured for Google devices.

The other measures include quick, automatic security patches, vulnerability disclosures and a Vulnerability Rewards Program, security bulletins for Common Vulnerabilities and Exposures (CVEs) and security checkups and audit tools to look for evidence of intrusions.

Bad Practice makes imperfect

MFA also features prominently in new guidance from CISA on what not to do, based on CISA’s Secure by Design initiative.

CISA is currently seeking feedback on its “Product Security Bad Practices” guidance.

The agency urges organizations to avoid development in “memory unsafe languages,” like C or C++, or user-provided input into SQL query or OS command strings. Default passwords are also identified as a bad security practice.

CISA warns organizations not to use open-source software components with known vulnerabilities, or to flout their responsibility to publish CVEs in a timely manner.

MFA should be enabled by default for administrator accounts by January 1, 2026, giving hackers a deadline to attack a relatively common bad practice.

The comment period ends on December 2, 2024.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Veriff boosts KYC, fraud prevention capabilities with Data Zoo integration

Identity verification platform Veriff is integrating Data Zoo’s data capabilities, allowing its customers to check real-time information from authoritative global…

 

Regula builds age, gender estimation into ID document scans

Regula is enhancing its document reader software with biometric age and gender estimation based on document photos. The identity verification…

 

AI agents and how to govern them: Tailscale, Saviynt offer solutions

The sales pitch for agentic workflows always has a risk caveat. Scaling agentic activity means making necessary upgrades in identity…

 

Milwaukee Sheriff moves to integrate Biometrica despite MPD facial recognition freeze

Milwaukee County Sheriff’s Office (MCSO) is in negotiations with Biometrica to join the network of law enforcement agencies using its…

 

X, Meta, TikTok under fire for deepfake CSAM in Europe

The Spanish government has called on its public prosecutor to investigate social media platforms X, Meta and TikTok for allegedly…

 

Pakistan Super App for gov’t services, document verification advances toward launch

Pakistan’s government is preparing to roll out a “Super App” that will allow citizens to access public services and verify…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events