Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 1800-17 (DRAFT)

Multifactor Authentication for E-Commerce

Date Published: August 2018
Comments Due: October 22, 2018
Email Comments to: consumer-nccoe@nist.gov

Author(s)

William Newhouse (NIST), Brian Johnson (MITRE), Sarah Kinling (MITRE), Blaine Mulugeta (MITRE), Kenneth Sandlin (MITRE)

Announcement

According to a recent independent analysis, e-commerce fraud increased by 30 percent in 2017, compared to 2016, as malicious actors shift from using stolen credit card data in stores at the checkout counter to using stolen credit card data for fraudulent online shopping. Because online retailers cannot utilize all of the benefits of improved credit card technology, they should consider implementing stronger authentication to reduce the risk of e-commerce fraud.

In collaboration with stakeholders in the retail sector, the National Cybersecurity Center of Excellence (NCCoE) is publishing a draft practice guide that explores risk-based scenarios that use multifactor authentication (MFA) to help reduce fraudulent online purchases. In the project’s example implementations, if certain risk elements (contextual data related to the transaction) are exceeded that could indicate an increased likelihood of fraudulent activity during the online shopping session, the purchaser will be prompted to present another distinct authentication factor—something the purchaser has—in addition to the username and password.

The NCCoE’s practice guide, Multifactor Authentication for E-Commerce, can help organizations reduce online fraudulent purchases, show customers that the organization is committed to its security, help avoid system-administrator-account takeover through phishing, and assist organizations to implement the example solutions by using the step-by-step guide. 

Abstract

Keywords

electronic commerce (e-commerce) security; internet shopping security; multifactor authentication (MFA)
Control Families

Access Control; Awareness and Training; Security Assessment and Authorization; Configuration Management; Identification and Authentication; Physical and Environmental Protection; Program Management; Risk Assessment; System and Communications Protection; System and Information Integrity;