top of page
2AA Header4.png
ROLE

Product Designer IV

DURATION

5 months (Feb 2022 - Jun 2022)

Designing the future-proof access review framework to mitigate multiple attack vectors

Background

Meta Business Manager (business.meta.com) is one of Meta’s core tools for accounts management, which allows businesses to keep all of their Instagram and Facebook accounts and other valuable assets in one place under a single business account. Currently, attackers can take control of the business by compromising the Facebook of an employee with admin access to the business account. Once they are in the system, they can conduct powerful admin-level actions with only a few clicks. Without a compromise detection system, the attacker can exploit the businesses with no friction.

In H1’ 2022, our team launched the Second Admin Approval (2AA) initiative to combat security breaches and provide businesses with an additional layer of security to monitor important user requests. The 2AA feature is a compromise detection system that notifies a second admin in the same business account to review user requests and approve/reject them before they can be sent or completed, which allows the admin to detect and intercept potential breach scenarios. This initiative is a crucial step in preventing unauthorized activities and safeguarding the platform's integrity. Below is one example of an attack and how 2AA works to stop it:

Current.png
After.png

Responsibilities

As the design owner, I was responsible for creating the UX strategy and identifying the design approach for 2AA intervention across multiple attack flows, which are malicious user requests initiated by compromised Facebook accounts. I worked on clarifying the product scope, gathering compromise use cases, defining product and user requirements, and prioritizing features by working closely with design partners, research, product management, marketing, data science, engineering, and other cross-functional partners. My goal is to design a single framework that can be reused in different product flows to mitigate attacks, while maintaining business-as-usual user activities.

Highlights

To understand the attack scenarios, I interviewed the product owners experiencing the attacks, to understand how the attacks occur within Meta's business ecosystem. Together, we investigated specific user requests that are directly linked to top revenue leakages, which can be addressed by 2AA. Using visual diagrams to illustrate the existing system and its underlying problems, I identified the common pattern across the attacks and uncovered additional security loopholes that were pathways for breaches. 

 

 

I pinpointed the optimal entry points for 2AA to interfere attack flows and designed a scalable system that alerts admins to review potential attack scenarios. We shipped a robust yet flexible 2AA framework design that is now capable of mitigating 10 attack vectors and will be used to scrutinize more business-sensitive requests in the future. The visual below shows how the scalable design can be customized to address multiple attack scenarios:

10 use cases.png

Impact

Since its launch in July 2022, 2AA has significantly reduced unauthorized access and activities, defending businesses from malicious attacks. This feature is released to 100% of target audience for the Credit Line Sharing use case. Within days of launch, 2AA has already stopped hundred-millions in leakage from unauthorized user requests, and saving 300k daily. About 95% of credit line share requests were approved on same or next day, meaning 2AA is not blocking authorized and legitimate requests. $10B of credit lines is on track to go through 2AA over the course of the year. In the future, more product flows will integrate the same framework to mitigate attack scenarios and protect businesses from significant revenue loss.  

Want to learn more about my work? Reach me at rmx369@gmail.com.

bottom of page