INTERMEDIATE // REAL TIME RESPONSE
MODULE 05 // ADAPTIVE SECURITY

Step-Up Authentication.

Use ABIS risk scores to trigger additional authentication when needed. Balance security with user friction through intelligent step-up flows.

RISK-BASED STEP-UP

Step-up authentication adds friction only when behavioral signals warrant it. Low-risk users proceed unimpeded; high-risk users face additional verification. This maximizes security while minimizing legitimate user friction.

Design step-up challenges that match the risk context. Device fingerprint anomaly? Verify via trusted device. Geographic impossibility? Confirm via SMS to registered phone. Velocity spike? Require additional identity verification.

Track step-up completion rates. If legitimate users frequently abandon at step-up, thresholds may be too aggressive or challenge UX too burdensome. Balance is key.

PASS

No Step-Up

Risk score below threshold. User proceeds with no additional friction.

CHALLENGE

Step-Up Required

Medium risk detected. User completes additional verification before proceeding.

BLOCK

Access Denied

High risk. Step-up not offered. User directed to support for manual verification.

KNOWLEDGE CHECK // Q05
How should step-up challenge type be selected based on risk signals?