This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Knowledge Based Authentication Performance Metrics Project

From OWASP
Revision as of 17:48, 27 July 2015 by AnnElizabeth Racuya-Robbins (talk | contribs) (Main)

Jump to: navigation, search
OWASP Project Header.jpg

News and Events

Please see the News and Talks tabs

What is KBA-PMP

There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.


KBA-PMP Best Practices

KBA-PMP Project Supports the NSTIC Guiding Principles

KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.

The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:

1. Identity solutions will be privacy-enhancing and voluntary.


2. Identity solutions will be secure and resilient.


3. Identity solutions will be interoperable.


4. Identity solutions will be cost-effective and easy to use.


Related Projects

ASVS

[[1] Choosing and Using Security Questions Cheat Sheet]

OWASP NIST NSTIC Initiative

Licensing

Creative Commons Attribution ShareAlike 3.0 License



Project Leaders

Project Manager Scrum Leader

Join our Mailing List

Mailing List

Follow us on Twitter

@OWASP_KBAPMP

Our Next Meeting

Monday August 3, 2015 at 11:00 AM - 12:30 PM US Eastern Time

AGENDA

All Meetings are Open and All are Welcome

  • Welcome and Introductions
    • Questions and Processes Healthcare Providers who use KBA)
    • Ways Forward for KBA-PMP
    • Its time to ask for resources to support our project. Lets discuss.
    • KBA-PMP Data Collection if ready.
    • If time allows
      • New approaches to KBA metrics
        • Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)
  • Ongoing:
  • Outreach to KBA Providers and other Stakeholders Continues
  • Next Steps: Tasks
  • Adjourn

WHERE

GoToMeeting https://www3.gotomeeting.com/join/642177878 Access Code: 642-177-878

2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone. Dial +1 (571) 317-3112 Audio PIN: Shown after joining the meeting Meeting ID: 642-177-878 GoToMeeting® Online Meetings Made Easy® Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app

KBA-PMP Project Metrics

https://github.com/KBA-PMP-ADMIN


Classification

New projects.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg

May 19-20, 2015

Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/.

May 21, 2015

Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/

OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project

Goals - To meet the requirements of the IDESG KBA Solicitation:

KBA PROJECT PHASES (PROPOSAL) Dear KBA collegues, we propose an action plan divided in the following phases:

FIRST PHASE: SCANNING THE MARKET The goal of this first phase, is to understand how KBA is working today (static and dynamic), and how KBA methodologies have been implemented by KBA providers. I think this a good departure point.

  • 1. Footprinting the KBA market providers.
  • 2. Identifying the KBA product providers used by the main market players.
  • 3. Identifying the advantages and drawbacks of KBA provider's methodology.
  • 4. Draw the document's structure.
    • Complete document structure v1
  • 5. Initial Timeline
  • 5. Launch Participant Outreach

SECOND PHASE: DEVELOPMENT Once the advantages and drawbacks of the KBA market have been clearly identified, it would be necessary to have our own platform for testing purposes. This will give us the right perspective about developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest building an open wiki, to get community feedback.

  • 1. Setting an Application for KBA testing purposes.
  • 2. Build an open wiki for community feedback.
  • 3. Test the KBA proposals in our test application.
  • 4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).

THIRD PHASE: EDITION This phase is very important, as it concerns the text edition. Once all proposals have being tested in our lab, we should translate them into a clear document.

  • 1. Edit the contents of the sources (sources such as the wiki).
  • 2. Release the version 1.0. and license it under the terms of a suitable license.

Initial Overview

  1. Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.
  2. Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.
  3. Survey and research other standards groups and their interests.
  4. Phase I footprinting
  5. Phase II Development
  6. Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.
  7. Research Licensing models //


1. Knowledge Based Authentication: Paradigms and Challenges https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing"

: Top - 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z



0–9

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Performance Metrics

Q

R

S

T

U

V

W

X

Y

Z

: Top - 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z



0–9

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

Scalability

T

U

V

W

X

Y

Z

Contributors

Ann Racuya-Robbins Project Co-Leader

Luis Enriquez Project Co-Leader

How can I participate in your project?

All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.

If I am not a programmer can I participate in your project?

Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.