diff --git a/docs/pages/guides/endpoint-security/hardware-security-keys.mdx b/docs/pages/guides/endpoint-security/hardware-security-keys.mdx new file mode 100644 index 00000000..48361b47 --- /dev/null +++ b/docs/pages/guides/endpoint-security/hardware-security-keys.mdx @@ -0,0 +1,81 @@ +--- +title: "Hardware Security Keys | Security Alliance" +description: "Use hardware security keys on critical accounts, keep a backup enrolled, and avoid weak recovery paths." +tags: + - Security Specialist +contributors: + - role: wrote + users: [louis, dickson] +--- + +import { TagList, AttributionList, TagProvider, TagFilter, ContributeFooter } from '../../../../components' + + + + +# Hardware Security Keys + + + + +## Summary + +> 🔑 **Key Takeaway for Hardware Security Keys:** Use FIDO2/WebAuthn security keys on high-value accounts, register +> at least two keys per critical account, disable SMS fallback where possible, and test recovery before you need it. + +Hardware security keys are one of the strongest practical defenses against phishing, credential stuffing, and +SIM-swap-based account takeovers. They are especially valuable for email, source control, registrars, cloud platforms, +social accounts, and any admin or financial account that could be used to pivot into the rest of your organization. + +## For Individuals + +These steps apply to personal and work accounts that support FIDO2/WebAuthn security keys or passkeys stored on a +hardware key. + +### Setup Checklist + +- [ ] Buy at least **two** security keys from a reputable vendor such as Yubico +- [ ] Prefer keys that match your device mix: + - USB-C for modern laptops and phones + - NFC if you regularly authenticate on mobile +- [ ] Label one key **Primary** and the other **Backup** +- [ ] Register both keys on every critical account that supports them: + - Primary email + - GitHub and code hosting + - Registrar and DNS providers + - Cloud and deployment platforms + - Banking, custody, or treasury accounts + - Social and communication accounts +- [ ] Where offered, prefer: + - **Security key** + - **Passkey on hardware key** + - Other phishing-resistant WebAuthn/FIDO2 options +- [ ] Disable **SMS** as a recovery or second-factor method wherever the service allows it +- [ ] Save provider-issued backup or recovery codes offline +- [ ] Test both the primary and backup key after enrollment + +### Practical Use + +- Keep the **Primary** key with you for normal logins +- Store the **Backup** key in a separate secure location, not in the same bag or drawer +- Maintain a short note in your password manager listing which critical accounts have which keys enrolled +- If a service allows multiple authentication methods, avoid leaving weaker fallback paths enabled unless they are + operationally necessary +- Replace lost or damaged keys immediately and re-test the remaining enrolled key + +### Recovery Discipline + +- Do not wait until you lose a key to learn how account recovery works +- If you lose your only key and do not have a second enrolled key or a usable recovery path, you can lock yourself out + of critical accounts at the moment you most need them +- Verify that your recovery path does not depend on a phone number if you are trying to reduce SIM-swap risk +- If an account only supports app-based MFA or SMS, record that exception clearly and prioritize moving the account to + a stronger provider or stronger configuration when possible + +## Further Reading + +- [Opsek YubiKeys Cheatsheet](https://github.com/Opsek/Yubikeys-cheatsheet) +- [Yubico: YubiKey Authenticator](https://www.yubico.com/products/yubico-authenticator/) + + + diff --git a/docs/pages/guides/endpoint-security/index.mdx b/docs/pages/guides/endpoint-security/index.mdx index f9f5eae7..5f4c85a5 100644 --- a/docs/pages/guides/endpoint-security/index.mdx +++ b/docs/pages/guides/endpoint-security/index.mdx @@ -11,4 +11,5 @@ title: "Endpoint Security" ## Pages +- [Hardware Security Keys](/guides/endpoint-security/hardware-security-keys) - [Zoom Hardening Guide](/guides/endpoint-security/zoom-hardening) diff --git a/vocs.config.tsx b/vocs.config.tsx index 0c7d129e..6fa7ce70 100644 --- a/vocs.config.tsx +++ b/vocs.config.tsx @@ -533,6 +533,7 @@ const config = { text: 'Endpoint Security', collapsed: true, items: [ + { text: 'Hardware Security Keys', link: '/guides/endpoint-security/hardware-security-keys' }, { text: 'Zoom Hardening', link: '/guides/endpoint-security/zoom-hardening' }, ] }, diff --git a/wordlist.txt b/wordlist.txt index 71349ab7..ea7cffd2 100644 --- a/wordlist.txt +++ b/wordlist.txt @@ -332,4 +332,5 @@ SSDF SLSA pids Kata -rootfs \ No newline at end of file +rootfs +Opsek