Gartner Research

Nine Best Practices for Question-and-Answer Identity Verification Methods

Published: 29 May 2009

ID: G00167242

Analyst(s): Gregg Kreizman , Ant Allan

Summary

Q&A identity verification methods are widely used because of their ease of use. But the factors behind that ease of use also make these methods vulnerable to attack. Enterprises must implement Q&A methods and choose verification questions with care to avoid undermining authentication processes.

Table Of Contents
  • Overview
  • How Does a Q&A Identity Verification Method Work?
  • How Are Q&A Methods Used in Password Management?
  • What Are the Principles Behind the Best Practices?
  • Best Practices
    • Do Not Use Identifiers as Verifiers
    • Avoid Questions With Easily Discoverable Answers
    • Choose "Strong" Questions
    • Validate Answers on Registration
    • Use Fuzzy Verification
    • Use Multiple Unrelated Questions
    • Vary Which Questions Are Asked Each Time
    • Monitor for and Respond to Potential Attacks
    • Augment Q&A Methods to Improve Assurance Levels
  • Are There Special Considerations When Using Q&A Methods With Automated Telephony Systems?
  • What Approaches Are Appropriate When Users Forget the Answers to Their Questions?

©2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client

Learn how to access this content as a Gartner client.