2021. What an interesting year. With the world turned upside down by a pandemic that seemingly had its sights set on...
Effectively Secure Cloud-Native Applications with Multi-Factor Authentication
CSP
Developers are under pressure to build and ship applications faster than ever and update applications frequently through automated processes. Corporations are now deploying applications developed on containers straight into production, managing them with orchestration tools such as Kubernetes, and running them in the cloud.
As a result, productivity increases, but so does the organizational risk. Striking a balance between speed and security requires a comprehensive strategy to proactively address cloud-native security requirements. An inclusive cloud security strategy allows an organization to detect security issues earlier in the development lifecycle without slowing down the whole process.
Organizations must implement a multi-pronged security approach to ensure secure access to information across the different cloud environments. The unified policies should govern access and control, regardless of whether the security gateways and services are located onsite or on the Cloud.
An organization has to consider deploying the right security solutions for cloud-based business operations. Strengthening network and IT infrastructure security is crucial for businesses. When it comes to cloud security, it is not just about simply placing a firewall at the peripheral of the cloud Infrastructure. From a security standpoint, it includes a comprehensive analysis of the current policies, procedures, and security standards that are in place.
New technologies for building cloud applications such as containers, Kubernetes, and serverless architectures are reshaping the way enterprises build and deploy business applications. They have also introduced a new set of risks that you can’t mitigate by applying traditional approaches to application security. So how do you ensure the security of your cloud-native applications?
Depending on the current security stance, the organization will have to implement numerous security tools, including Intrusion Prevention and Detection Systems, Identity Access Management, and Multi-factor Authentication.
On this last item, modern authentication methods represent a more robust security structure, and also provide a better user experience when logging into applications. MFA also makes it easier for auditors to get answers to critical compliance questions; providing information such as which users are granted access to which system, and also how the access policy is being reliably enforced. Additionally, some of the modern MFA applications available today also include reporting capabilities, which ensure that compliance standards, such as PCI DSS, are being met.
Â
Introducing the New CSP Authenticator +
Cloud-Native Application
CSP Authenticator+® provides multi-factor authentication for NonStop servers and supports various authentication methods. It can be used as a Safeguard SEEP or with Pathway and non-Pathway applications. Almost any application, including TACL, can now easily support multi-factor authentication.
The new CSP Authenticator + cloud-native application was developed using a modern cloud-based framework. This redesign focuses on providing security, flexibility, and scalability.
Multiple authentication methods such as RADIUS, Active Directory, RSA, and Open LDAP are supported. Additional authentication methods include Email, Text Message, and Google Authenticator.
New features:
- New cloud-based framework – A new cloud native application built using modern technologies
- Support for Kubernetes Helm deployments – easy to deploy in cloud environments using Kubernetes framework
- Support for High Availability environments – Create highly available Kubernetes clusters for resiliency
- No differentiation between Primary and Secondary authentication – users can choose any mix of available authentication methods, and even choose more than 2 authentication methods
- Application based authentication methods are now supported, and more authentication methods are being added. Authentication methods currently supported include RSA, LDAP, Active Directory, RADIUS, Google and Microsoft authenticator, OTP via Email, and OTP via SMS
- Set different authentication methods for different user groups and privileged groups
- Redesigned user-interface makes it more intuitive and user friendly
- Maintain a matrix of authentication profiles, policies (authentication methods), and users
- Support for various databases, including Amazon S3, Atlas Cloud service, MongoDB, etc.
Benefits:
- Protect valuable resources & data.
- Add layers of authentication for secure access to systems and critical applications.
- Address PCI compliance requirement 8.3 which requiring multi-factor authentication for all personnel with remote access, and non-console administrative access to the cardholder data environment.
- Integrate with centralized ID management systems to effectively manage users.
CSP Authenticator+ Key Features:
- Support for multiple authentication factors including RSA, RADIUS, Active Directory, and LDAP, Microsoft, Google, OTP
- Create various profiles and policies for different set of users, and applications
- Ability to use more than two authentication methods
- Provides standardized authentication across platforms
- Configure for all or only selected/privileged users
- Fully encrypted communications with cloud native application
- Supports various databases
- Support for new authentications methods
- Supports TACL, Pathway and Non-Pathway applications
CSP – Compliance at your Fingertipsâ„¢
For complimentary access to CSP-Wiki®,
an extensive repository of NonStop security knowledge
and best practices, please visit wiki.cspsecurity.com
Â
We Built the Wiki for NonStop Security ®
The CSP Team         Â
+1(905) 568 –8900