Chapter 6: Security & Risks

Threat model, attack vectors, risk mitigation controls, and compliance mapping for identity authentication systems

The identity authentication system is a high-value target for attackers because compromising it grants access to all protected resources. A comprehensive security and risk framework must address threats at every layer: protocol weaknesses, implementation vulnerabilities, operational failures, and insider threats. This chapter presents a structured threat model, identifies the highest-priority attack vectors, defines mitigation controls, and maps requirements to major compliance frameworks including NIST SP 800-63, ISO 27001, PCI DSS, and SOC 2.

6.1 Threat Model

The STRIDE threat model provides a structured framework for identifying and categorizing threats to the identity authentication system. Each threat category maps to specific attack vectors and corresponding mitigations. The threat model should be reviewed annually and updated whenever significant architectural changes are made or new threat intelligence is received.

STRIDE CategoryThreat DescriptionAttack ExamplePrimary MitigationRisk Level
SpoofingAttacker impersonates a legitimate user or deviceCredential stuffing, pass-the-hash, rogue RADIUS serverMFA, EAP-TLS mutual auth, RADIUS server certificate validationCritical
TamperingAttacker modifies authentication data in transit or at restRADIUS packet manipulation, AD object modificationTLS for all RADIUS traffic (RadSec), AD audit logging, integrity monitoringHigh
RepudiationUser or admin denies performing an actionAdmin denies unauthorized config change, user denies sessionImmutable audit logs, session recording, NTP-synchronized timestampsHigh
Information DisclosureSensitive identity data exposed to unauthorized partiesRADIUS shared secret exposure, LDAP credential sniffingLDAPS/TLS, strong RADIUS secrets, HSM for key storageHigh
Denial of ServiceAuthentication service made unavailableRADIUS flood attack, OCSP responder overloadRate limiting, RADIUS cluster HA, OCSP staplingCritical
Elevation of PrivilegeAttacker gains higher access than authorizedVLAN hopping, TACACS+ bypass, PAM credential theftDynamic VLAN enforcement, TACACS+ command authorization, PAM MFACritical

6.2 Top Attack Vectors and Mitigations

Based on real-world incident data and penetration testing findings, the following attack vectors represent the highest-priority risks for enterprise identity authentication systems. Each vector is accompanied by a detailed description, detection indicators, and a layered mitigation strategy that addresses prevention, detection, and response.

Attack VectorDescriptionDetection IndicatorsPreventionDetection & Response
Credential StuffingAutomated use of breached username/password pairs against authentication endpointsHigh auth failure rate from single IP; multiple accounts from same sourceMFA mandatory; account lockout; IP rate limitingSIEM alert on failure rate threshold; SOAR block + notify
Pass-the-Hash / Pass-the-TicketAttacker uses captured NTLM hash or Kerberos ticket without knowing plaintext passwordLateral movement from compromised host; unusual service ticket requestsCredential Guard; LAPS; restrict NTLM; tiered admin modelEDR detection; SIEM Kerberos anomaly rules; isolate host
Rogue RADIUS ServerAttacker deploys unauthorized RADIUS server to capture EAP credentialsNew RADIUS server IP in logs; EAP-TTLS/PEAP auth from unknown serverServer certificate validation in supplicant; RADIUS server IP whitelist on switchNAC anomaly detection; alert on new RADIUS server IP
RADIUS Shared Secret Brute ForceAttacker attempts to recover RADIUS shared secret from captured packetsUnusual RADIUS traffic patterns; failed auth from unknown NASShared secret ≥ 32 random chars; rotate annually; use RadSec (TLS)SIEM alert on unknown NAS; audit shared secret age
Certificate Theft / MisuseAttacker steals a valid machine or user certificate for unauthorized accessAuth from unexpected device/location with valid cert; cert used after device decommissionShort cert lifetime (90 days); OCSP revocation; device binding in cert SANSIEM alert on cert usage anomaly; immediate revocation workflow
Insider Privilege AbuseAuthorized admin misuses privileged access for unauthorized purposesOff-hours admin activity; commands outside normal role; access to sensitive segmentsPAM session brokering; TACACS+ command authorization; SoD enforcementPAM session recording; SIEM behavioral analytics; manager review

6.3 Security Hardening Checklist

The following hardening checklist provides a prioritized set of security controls that must be implemented before production deployment. Controls are categorized by component and priority level, enabling project teams to track implementation status and demonstrate compliance during security reviews.

ComponentControlPriorityValidation Method
RADIUS ServerRADIUS shared secrets ≥ 32 random characters; rotate annuallyP1 - CriticalConfig audit; entropy check
RADIUS ServerEnable RadSec (RADIUS over TLS) for all authenticators that support itP1 - CriticalPacket capture verification
RADIUS ServerRestrict NAS IP whitelist; deny unknown authenticatorsP1 - CriticalConfig review; test with unknown NAS
RADIUS ServerEnable OCSP revocation checking with < 300 ms timeoutP1 - CriticalTest with revoked cert; verify rejection
AD/LDAPUse LDAPS (TCP 636) only; disable plaintext LDAP (TCP 389)P1 - CriticalPort scan; packet capture
AD/LDAPEnable AD audit logging for all authentication and authorization eventsP1 - CriticalGPO audit; SIEM log verification
PKI/CAOffline root CA; sub-CA in HSM; air-gap root CA after issuanceP1 - CriticalPhysical inspection; HSM audit
PKI/CACertificate lifetime ≤ 1 year for user/device certs; ≤ 90 days for high-securityP2 - HighCA template review
TACACS+Enable per-command authorization; deny all commands not explicitly permittedP1 - CriticalTest with unauthorized command
PAMMFA required for all PAM sessions; no bypass mechanismP1 - CriticalAttempt session without MFA; verify block
All ServersManagement access via PAM jump server only; disable direct SSH/RDPP1 - CriticalDirect SSH test; verify block
All ServersNTP synchronization with authentication; max offset < 100 msP2 - HighNTP status check; offset measurement

6.4 Compliance Framework Mapping

Enterprise identity authentication systems must satisfy requirements from multiple compliance frameworks simultaneously. The following mapping table aligns key authentication controls with specific requirements from NIST SP 800-63B, ISO/IEC 27001:2022, PCI DSS v4.0, and SOC 2 Type II. This mapping supports compliance reporting and audit evidence collection.

Control AreaNIST SP 800-63BISO 27001:2022PCI DSS v4.0SOC 2 Type II
MFA for privileged accessAAL3 (hardware authenticator)A.8.5 (Secure authentication)Req 8.4.2CC6.1
Password / credential policySP 800-63B §5.1A.5.17Req 8.3.6CC6.1
Session managementSP 800-63B §7A.8.5Req 8.2.8CC6.1
Audit loggingSP 800-92A.8.15Req 10.2CC7.2
Log retentionNIST SP 800-92A.8.15Req 10.7 (12 months)CC7.2
Certificate managementSP 800-57A.8.24Req 4.2.1CC6.7
Network segmentationSP 800-125BA.8.22Req 1.3CC6.6