Why Is the UK NCSC Shifting to Passkey Authentication?

Why Is the UK NCSC Shifting to Passkey Authentication?

Anand Naidu brings years of full-stack development experience to the table, specializing in the delicate balance between high-level security and seamless user experience. As the digital landscape shifts toward a passwordless future, he offers a deep dive into why the UK’s National Cyber Security Centre is now championing passkeys as the gold standard for consumer protection. This conversation explores the death of the shared secret, the architectural hurdles of legacy systems, and the critical importance of securing non-human identities. We discuss how moving to a FIDO2-based framework eliminates the risks of credential reuse and phishing, while addressing the practical challenges of a multi-year hybrid transition.

Security authorities now advocate for passkeys as the primary login standard over traditional passwords. What specific cryptographic mechanisms make these credentials more resilient against relay attacks, and how does tying authentication to a physical device fundamentally change the threat model for a typical consumer?

Passkeys utilize a FIDO2-based framework that fundamentally replaces the vulnerable “shared secret” with a sophisticated pair of cryptographic keys. One key stays locked inside your device’s secure enclave, never leaving the hardware, while the other is public, meaning there is simply no sensitive data for a hacker to intercept and reuse. This shift transforms the threat model because an attacker can no longer just steal a string of characters from a database or trick a user into typing a code into a fake site. For the typical consumer, the experience feels much lighter—they simply provide a biometric touch or a PIN to prove they possess the physical device, which effectively binds their identity to the hardware they hold in their hand. By removing the reliance on shared secrets, we eliminate the primary vector for relay attacks where an attacker sits in the middle and captures a password to use later.

Many organizations currently rely on multi-factor authentication involving one-time codes, yet these methods remain inherently phishable. How do passkeys eliminate the risks associated with credential reuse, and what architectural shifts must a developer prioritize when moving away from the “password-plus-MFA” paradigm?

Even the most robust one-time codes can be intercepted by sophisticated phishing kits that mirror a login page in real-time, but passkeys are architecturally bound to the legitimate service. When a developer moves away from the “password-plus-MFA” paradigm, they are moving toward a foundation where the browser and the device handle the heavy lifting of verification through a challenge-response mechanism. This requires a shift in mindset to treat authentication as a broader identity modernization opportunity rather than a simple credential swap. We have seen that passkeys are as secure or even more secure than traditional multi-factor authentication against all common credential attacks observed in the wild today. Developers must prioritize building systems that no longer store secrets that can be leaked, fundamentally changing how the backend validates a user’s presence and intent.

Transitioning to a passwordless environment often requires a hybrid model that lasts for several years. What specific vulnerabilities are introduced when legacy systems and modern passkeys coexist, and how can businesses ensure that account recovery flows do not become a weak link in their security chain?

The reality of modern enterprise is that legacy systems and fragmented identity environments aren’t going to vanish overnight, leading to a hybrid model that will likely last for several years. The danger here is that while the front door is locked with a passkey, the “back door” of account recovery flows—like password resets—might still rely on weaker, phishable processes that an attacker can exploit. If a user can still reset their “secure” account using a legacy email link or a simple security question, the entire cryptographic benefit of the passkey is undermined. Businesses must ensure that their fallback mechanisms don’t become the path of least resistance for an attacker looking to bypass modern security. It requires a meticulous audit of the full user journey, from initial sign-up to the moment a user loses their phone and needs to regain access without compromising the entire chain.

While consumer-facing apps are a major focus, the machine identity layer often presents hidden risks during authentication upgrades. Why is it dangerous to overlook non-human identities during a passkey rollout, and what step-by-step strategies can help enterprises modernize these automated authentication environments?

It is a massive oversight to focus entirely on human logins while leaving the machine identity layer—the automated scripts and service-to-service calls—operating on old, insecure protocols. If an organization ignores these non-human identities during a rollout, they inadvertently create new security gaps that sophisticated attackers are more than happy to exploit. Modernizing these environments involves a step-by-step strategy of identifying every automated service and transitioning them to more secure, token-based authentication that mirrors the principles of passkeys. This prevents the “credential reuse” trap where a single leaked secret from a legacy script provides a skeleton key to an otherwise modern infrastructure. Treating machine identities with the same level of scrutiny as human users is essential for a truly cohesive security posture that leaves no stone unturned.

Since passkeys rely on device-bound verification like biometrics or PINs, hardware compatibility remains a hurdle. How should organizations handle users on older devices without sacrificing security, and what metrics should they track to determine when it is safe to retire traditional password support entirely?

We cannot simply lock out users who are using older hardware, so the current recommendation is to provide a tiered approach where password managers and traditional two-step verification serve as a safety net. Organizations should track metrics like the percentage of the user base on FIDO2-compatible devices and the success rates of passkey registrations versus legacy logins. It is crucial to monitor how often users are forced to fall back to passwords, as this data reveals the true state of your ecosystem’s readiness. Once the data shows that a vast majority of the traffic is coming from modern environments, the risk of retiring password support becomes manageable rather than a business-stopping event. It is about a gradual, data-driven sunsetting process that ensures no one is left behind while the overall security floor is raised for everyone.

What is your forecast for passkey adoption?

I expect that we will see a massive surge in passkey adoption as major tech players and national agencies like the NCSC provide the necessary leverage for security leaders to demand better standards from their vendors. The transition will not be instantaneous, and we will likely navigate a hybrid world for the next few years as businesses modernize their fragmented identity environments and legacy systems. However, as passkeys become the “first choice” for consumers due to their speed and ease of use, the sheer friction of managing complex passwords will eventually make traditional authentication obsolete. It is an exciting time where we are finally moving beyond the inherent vulnerabilities of the password toward a truly phishing-resistant future that protects both the enterprise and the individual. Over the next decade, the concept of “remembering” a password will likely become a relic of the past for the vast majority of digital interactions.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later