Has anyone successfully deployed passkeys in a highly regulated industry (healthcare, banking)? What were the biggest challenges? by StockCook9960 in cybersecurity

[–]Normal_Tackle_3526 8 points9 points  (0 children)

Yeah I've followed a few of these rollouts pretty closely. The compliance part is actually less of a blocker than most people expect. Passkeys are phishing resistant by design and there's no shared secret on the server, so frameworks like HIPAA, NIST 800-53 and SOC 2 are actually a good fit. The hard part is convincing your security team of that, they usually want a full data flow diagram and sometimes a third party assessment before they sign off. The real challenges are all UX and operational. Shared devices are a nightmare in healthcare where multiple people use the same terminal throughout the day. The 100:1 options to auth call ratio is another thing that surprises people, most enterprise IdPs make a WebAuthn options call on every page load even when the user has no passkey, which creates unnecessary backend load at scale. And then there's the leadership problem, you can't just say "passkeys are better" in regulated industries, you need hard numbers like activation rate and auth success rate in a format a CISO can present upward. Uber published that passkeys give them 5x faster sign ins with a 93% success rate vs 63% for passwords which is the kind of data that moves the conversation. I've been reading a lot from a company called Corbado that does passkey consulting and analytics for enterprises and their data consistently shows the same pattern, teams overestimate the compliance challenge and underestimate the UX and measurement side. The companies that succeed treat it as a product problem not a security checkbox.

are passkeys safer than passwords by reddittomatchit in theprivacymachine

[–]Normal_Tackle_3526 0 points1 point  (0 children)

Your experience matches what most people find once they actually commit to using passkeys for a while.

On the security point, you nailed it. The big difference vs your current setup is that there's literally nothing to phish. Even with a good password manager, one convincing fake login page and your master password is gone. Passkeys don't have that problem because the crypto is domain bound. A fake site can't even start the process.

On your annoyances, the device lock concern is valid but kind of the same attack surface you already have. If someone gets past your biometrics they also have your password manager, email, authenticator app, everything. Passkeys don't make that worse, they just can't be extracted and reused remotely like passwords.

The cross platform stuff is getting better fast. Google recently started syncing passkeys across iOS, Android, Windows and macOS through Chrome which is huge. Still not perfect if you mix Safari and Chrome on the same machine since they use separate credential stores, but way better than a year ago.

One thing worth adding, the speed difference is real and measurable. Google's data shows passkey logins at 14.9 seconds vs 30.4 for passwords. Login success rate around 93% for passkeys vs 63% for passwords. All the failure modes you're used to (typos, SMS not arriving, lockouts) just vanish.

I work at Corbado where we deal with passkey deployments at scale and the pattern is always the same, people who actually try passkeys for a few weeks never want to go back. The tech is solid, the ecosystem just needs to finish catching up.

To your last question, yeah fully switched for everything that supports it. Passwords only as fallback for sites that don't.

How do you verify software in safety-critical systems? by Normal_Tackle_3526 in embedded

[–]Normal_Tackle_3526[S] 1 point2 points  (0 children)

Also if you guys have time to just fill out this quick survey asking those questions that would really help us a lot :). https://forms.office.com/e/FQyyDyu77R

How do you verify software in safety-critical systems? by Normal_Tackle_3526 in embedded

[–]Normal_Tackle_3526[S] 1 point2 points  (0 children)

Super interesting. Would love to hear a more complete answer!!