Account Verification Steps | Organizations should verify the legitimacy of account details at the time of creation. For example, they can check the reputation of email addresses and phone numbers against public records. Businesses can also utilize MFA techniques like email magic links and SMS OTPs to force the verification of important account details. |
Identity Verification / Identity Proofing | Organizations also need to check that new users are who they claim to be. Depending on the industry, there are different Know Your Customer (KYC) practices employed for identity verification. To illustrate, a bank might require a valid ID document for a new account, while ecommerce sites may only employ identity verification when selling extremely high-value or age-restricted goods. |
Device & Network Reputation and Anomalies | Detecting anomalies and malicious intent based on device and network attributes of the client device registering and using the account. For example detecting traffic coming from anonymized networks, data centers, devices with abnormal hardware attributes, forged device attributes etc. |
Behavioral Assessment / Bot Detection | Behavioral assessments protect against fraudsters and bots by monitoring new accounts for anomalous activity. The legitimacy of a new account is assessed based on the behavioral attributes of a user while they go through the account creation journey. This assessment should be able to identify non-human ways of interacting with a device to weed out bots and emulators. Repeat account creations from the same device or IP address, as well as behavioral patterns that show the user is unfamiliar with account details, are also key indicators of a bad actor or bot. Strange behavior immediately following account creation - like the use of referral codes to open multiple new accounts - is also a red flag. |