Download Publication
Who it's for:
- IT Security Professionals
- System Administrators
- Software Developers
- Cybersecurity Analysts
- Network Engineers
Beyond Passwords: The Role of Passkeys in Modern Web Security
Release Date: 11/12/2023
Working Group: Identity and Access Management
- What Passkeys are and how they operate using cryptographic keys
- The security advantages of Passkeys over traditional passwords
- How Passkeys improve security by reducing the risk of phishing and other attacks
- How Passkeys integrate with WebAuthn and FIDO standards
- How to set up and manage Passkeys across different devices and operating systems
- Potential vulnerabilities and best practices for maintaining Passkey security
Download this Resource
Acknowledgements
Andrew Klaus
Mark Loveless
Guillaume Rossolini
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Kurt Seifried
Chief Innovation Officer, CSA
For over two decades, Kurt has excelled in information security, starting with Windows and Linux, and advancing to cloud computing and AI. With a strong focus on AI security, privacy, and open source, Kurt brings extensive expertise to the Cloud Security Alliance (CSA).
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more