Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

Download Publication

Beyond Passwords: The Role of Passkeys in Modern Web Security
Beyond Passwords: The Role of Passkeys in Modern Web Security
Who it's for:
  • IT Security Professionals
  • System Administrators
  • Software Developers
  • Cybersecurity Analysts
  • Network Engineers

Beyond Passwords: The Role of Passkeys in Modern Web Security

Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usernames and passwords were the primary means of authentication. Next came two-factor authentication, which added an extra layer of security but is rather inconvenient. This paved the way for the emergence of Passkeys as a more secure and user-friendly authentication method. 

This research publication positions Passkeys as a revolutionary step towards passwordless authentication. It offers an in-depth explanation of how Passkeys work, while also contrasting them with other authentication methods. By leveraging the latest in cryptographic techniques and FIDO standards, Passkeys significantly enhance security while simplifying the user authentication process.

Key Takeaways:
  • What Passkeys are and how they operate using cryptographic keys
  • The security advantages of Passkeys over traditional passwords
  • How Passkeys improve security by reducing the risk of phishing and other attacks
  • How Passkeys integrate with WebAuthn and FIDO standards
  • How to set up and manage Passkeys across different devices and operating systems
  • Potential vulnerabilities and best practices for maintaining Passkey security
Download this Resource

Bookmark
Share
View translations
Related resources
Don’t Panic! Getting Real about AI Governance
Don’t Panic! Getting Real about AI Governance
Using AI for Offensive Security
Using AI for Offensive Security
AI Model Risk Management Framework
AI Model Risk Management Framework
Current Challenges with Managing Permissions and API Keys
Current Challenges with Managing Permissions and API Keys
Published: 09/18/2024
The Edge Revolution: Transforming Experiences in a Hyperconnected World
The Edge Revolution: Transforming Experiences in a Hyperconnected W...
Published: 09/17/2024
Top Threat #2 - Identity Crisis: Staying Ahead of IAM Risks
Top Threat #2 - Identity Crisis: Staying Ahead of IAM Risks
Published: 09/16/2024
What are OAuth Tokens, and Why are They Important to Secure?
What are OAuth Tokens, and Why are They Important to Secure?
Published: 09/12/2024

Acknowledgements

Andrew Klaus Headshot Missing
Andrew Klaus

Andrew Klaus

Mark Loveless Headshot Missing
Mark Loveless

Mark Loveless

Guillaume Rossolini Headshot Missing
Guillaume Rossolini

Guillaume Rossolini

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Kurt Seifried
Kurt Seifried
Chief Innovation Officer, CSA

Kurt Seifried

Chief Innovation Officer, CSA

For over two decades, Kurt has excelled in information security, starting with Windows and Linux, and advancing to cloud computing and AI. With a strong focus on AI security, privacy, and open source, Kurt brings extensive expertise to the Cloud Security Alliance (CSA).

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training