Original Release Date: 2/11/2021
Usernames and passwords provide a layer of security to systems and services; however, they are not sufficient in protecting against cyberattacks. The increase in password reuse, credential stuffing attacks, data breaches, and dark web and public disclosures necessitate the adoption and implementation of additional account security requirements, such as multi-factor authentication (MFA). Account compromises resulting from password theft, disclosure, or guessing can largely be prevented by enabling MFA. Therefore, we highly recommend users enable this feature for all accounts, where available, to protect against a cyberattack that could potentially cause significant financial loss, affect business continuity, and violate regulatory compliance.
What is MFA?
Identity, authorization, and authentication controls are security requirements that ensure access is controlled and securely provided to only authorized individuals, systems, and processes. An authentication control is a process used to validate a user’s identity. An example of this control is multi-factor authentication (MFA), which helps protect online accounts from unauthorized access. MFA includes using two or more of the following factors to achieve authentication during the login process for an account:
MFA is an effective measure to protect users from account compromise via credential theft or exposure as part of a data breach. Even if a threat actor gains access to an account password, they will not be able to access the associated account without the user’s second factor of authentication.
Authentication Methods
MFA requires two or more different factors and consists of a variety of authentication methods. Something you have includes physical objects, such as authentication apps on smart phones, smart cards, USB devices, and security hardware tokens. Something you know is a commonly used form of authentication and includes anything that can be remembered and then typed, verbalized, performed, or recalled, such as passcodes, PINs, combinations, code words, and answers to security questions. Something you are includes any part of the human body that can be used as verification, such as fingerprints, facial recognition, palm scans, retina scans, iris scans, and voice verification. Using one factor twice, such as two separate passwords, is not considered MFA as this does not include two or more different factors. Most accounts offer something you know – such as a passcode – as the first factor, although implementing any method of MFA is beneficial. The use of authentication apps on smart phones, security hardware tokens, or biometrics as a second factor are preferred over common SMS-based authentication methods due to the risk of SIM-swapping as a vector of compromise.
MFA Adoption and Implementation
There are many considerations when adopting and implementing MFA. Organizations should recognize any technical, change management, and financial challenges to user adoption; commit to open communication; and provide resources and training to employees. Some methods may not work for every organization and, therefore, organizations should consider strong, yet user-friendly authentication methods. MFA implementation may be optional or mandatory, depending on business requirements and other considerations. Examples of multi-factor technologies include remote authentication and dial-in service (RADIUS) with tokens; terminal access controller access control system (TACACS) with tokens; and other technologies that facilitate MFA. At a minimum, organizations are advised to require MFA for the following:
The adoption of MFA will continue to expand due to the ongoing remote workforce, the reliance on authentication for the use of cloud services and infrastructure, and the increase in account compromises and data breaches as a result of password-only authentication methods. The website TwoFactorAuth.org maintains a comprehensive list of websites that offer MFA. Implementing MFA for all online accounts is highly recommended, including major online services. Although MFA alone will not resolve all authentication challenges, it is a critical step for account security in mitigating risks associated with unauthorized access via credential compromise.
Recommendations
In addition to MFA, the NJCCIC recommends users apply cybersecurity best practices to protect their accounts and data in order to reduce the likelihood and impact of attack.
References