Talk With an Expert

Daisy Chain Authentication

Daisy Chain Authentication (PDF, 2.72MB)Published: 08 Aug, 2013
Created by
Courtney Imbert

An attacker can piece together a collection of accounts within an organization using public information and compromised data, building a 'daisy chain' to a target. With the upsurge of cloud-based services and web-facing applications, many organizations face a larger attack space for compromise. Since the process isn't highly technical, and the steps of the process fall within normal business procedures, it can be difficult to detect until the data is gone. Traditional approaches to information security, like securing individual systems and rule-based perimeter intrusion detection, fail in the face of attacks that use normal transactions to infiltrate networks. However, it is possible to detect such an attack with a holistic and multi-layered approach that includes an emphasis on identity assurance.