IMPLEMENTING COMPREHENSIVE IDENTITY CONTINUITY PLANS TO COUNTERACT CYBER THREATS
Raoul Hira , Principal Security Consultant, Vistra USAAbstract
The article examines the study of methods for implementing integrated identification continuity plans to counter cyber threats and outages with third parties. The study focuses on the analysis of various types of authentication failures, their implications for data security and business processes, as well as their impact on user experience. Approaches to the use of backup authentication and multi-factor authentication (MFA) providers, and continuous monitoring to increase the level of security are considered. The analysis demonstrates the need for regular testing of systems, the introduction of backup mechanisms to prevent failures, and risk assessment. The article also describes the importance of integrating modern solutions into an authentication system to minimize threats and maintain the continuous operation of key processes. The study highlights the importance of an integrated approach to ensuring data identification and protection in the context of modern cyber threats.
Keywords
cyber threats, authentication, backup providers
References
Wang D. et al. Understanding security failures of multi-factor authentication schemes for multi-server environments //Computers & Security. – 2020. – Vol. 88. – p. 101619.
Microsoft O365 Federation SSO issue. [Electronic resource] Access mode: https://status.okta.com/#incident/a9C4z000000Yzi5EAC (accessed 08/31/2024).
Okta Connectivity Disruption for Some US Customers. [Electronic resource] Access mode: https://status.okta.com/#incident/a9C4z0000009wkeEAA (accessed 08/31/2024).
Multiple Deployments: Single Sign-On Connectivity Errors. [Electronic resource] Access mode: https://status.duo.com/incidents/p1xdjgy4sj07(accessed 08/31/2024).
PingOne Service Interruption. [Electronic resource] Access mode: https://status.pingidentity.com/incidents/vsrhzjxhvn8s(accessed 08/31/2024).
Single Sign-On Issues for Microsoft O365 OneDrive. [Electronic resource] Access mode: https://status.okta.com/#incident/a9C4z000000TXIOEA4 (accessed 08/31/2024).
Strelets A. I. et al. Multi-user System For Remote Work with Programmable Devices //2024 Conference of Young Researchers in Electrical and Electronic Engineering (ElCon). – IEEE, 2024. – pp. 83-85.
Shirvanian M., Agrawal S. 2D-2FA: A new dimension in two-factor authentication //Proceedings of the 37th Annual Computer Security Applications Conference. – 2021. – pp. 482-496.
Okta Authentication: Streaming Access with Secure Identity Management. [Electronic resource] Access mode: https://www.cloudally.com/glossary/okta-authentication / (accessed 08/31/2024).
Article Statistics
Copyright License
Copyright (c) 2024 Raoul Hira

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.