FB pixel

Cyber Threat Observatory workshop advises on protections for national digital ID systems

Cyber Threat Observatory workshop advises on protections for national digital ID systems
 

The Alan Turing Institute launched the Cyber Threat Observatory last year to monitor cyber threats to digital ID systems. The observatory hosted a workshop with speakers and experts in cyber threats and digital ID, infrastructure and economy.

The Cyber Threat Observatory reviewed more than 31,000 security flaws, identifying Common Vulnerabilities and Exposures (CVEs) for national identity systems, mapping vendor and product hotspots, weaknesses and attack routes.

“The thing that is important for us is that we maintain our ability to identify the weaknesses in systems because if we identify a weakness we can work as a community to patch that weakness,” said professor Carsten Maple, of The Alan Turing Institute, at the top of the online workshop.

Digital identity flaws are rising the fastest among the four foundational domains of DPI (the other three being finance, health and government), with CVEs increasing from 290 in 2020 to 569 annually by 2024. The observatory found that broken logins and permissions dominate CVEs, while SQL injections and script attacks are “rampant.” And data leaks threaten every sector.

The institute’s research associate Shah Mahmood explained the importance of perimeter defense and segmentation. “We need to segment our networks,” Mahmood said, to avoid cross contamination across different parts of the network.

Adopting a certain mindset was crucial, such as embedding security from the start and to design out CVEs. Conducting regular code audits on authentication and input handling was another recommendation from Mahmood. Digital ID should be considered as critical infrastructure, like power grids or water supply, along with the same protections.

Considering global ID deployment, the observatory notes that cybersecurity skills and resources often lag behind rapid rollout. But there is “immense risk” if security is sidelined. Mahmood talked through the National Level Cyber Threat Observatory Playbook, which shifts protection from a “reactive patchwork” to “proactive, anticipatory defence.”

Speakers from MOSIP, Ernst & Young, Sri Lanka, CMU Africa, among others, introduced their insights and perspectives from the Global South. Sasikumar Ganesan, head of engineering at MOSIP explained that a national ID increases the attack surface. However, the national ID doesn’t mean anything to the attacker until it is more connected, for example to the banking system.

Ganesan also spoke on the particular identity theft that occurs in India and across Asia, with smishing (SMS-based attacks) and quishing (QR code-based attacks). “It’s not real identity theft,” he explained, “but it’s more subtle and very different.”

Navin Kaul, a partner at Ernst & Young, noted that GDP per capita spending on cybersecurity in developed markets is close to $30 but that it’s $1-2 in South Asia. But international collaboration can help with Nepal and Sri Lanka working together on threat intelligence and ICT exposure. Kaul said that it’s about building a culture of establishing digital public goods from a cyber angle.

Scott Rea, global strategic advisor at eMudhra, spoke on why public key infrastructure (PKI) is critical to identity in a zero trust paradigm and why identity starts with nations having strong binding of national identities to credentials that are trustworthy. But Rea also observed that while PKI requires the use of the strongest validated encryption technologies, trust cannot be achieved by technology alone. “A strong governance structure for how the technology will be deployed, operated, used and relied upon is necessary.”

Dasun Hegoda, technical advisor at the Digital Economy Unit, presidential secretariat, Sri Lanka, spoke on the exact components of the country’s digital infrastructure that makes up its digital economy blueprint.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Biometrics providers and credentials level up with new capabilities

Biometrics is a fast-evolving field about persistence, so new versions of major digital identity providers and biometric technology companies naturally…

 

Alan Goode offers insights on booming transitional IDV market on BU Podcast

Technology is transforming identity verification. According to Alan Goode of Goode Intelligence, by 2030, digital identity verification will pass traditional…

 

Share less data in more places: inching towards decentralized digital ID for travel

The travel industry is slowly shifting to a more decentralized model of digital identity. This was one of the key…

 

Clearview takes fresh legal hits over Canada class action, UK fine

Few biometrics companies have taken a bigger regulatory and legal beating than Clearview AI. It has already been a rough…

 

Mexico makes biometric identifier mandatory for all citizens

Mexico has officially introduced a digital identification system by signing a law that turned the previously optional biometric-based citizen code…

 

MOSIP highlights the UN DPI Safeguards Initiative

The United Nations’ DPI Safeguards Initiative has released 259 recommendations designed to guide regulators, advocates, donors, technology providers and governments…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

DIGITAL ID for ALL NEWS

Featured Company

ID for ALL FEATURE REPORTS

BIOMETRICS WHITE PAPERS

BIOMETRICS EVENTS

EXPLAINING BIOMETRICS