• Home
  • BVSSH
  • Engineering Enablement
  • Playbooks
  • Frameworks
  • Good Reads
Search

What are you looking for?

Practice : Multi-Factor Authentication (MFA)

Purpose and Strategic Importance

Multi-Factor Authentication (MFA) significantly strengthens access security by requiring users to provide two or more verification factors to gain access. It mitigates the risk of compromised credentials and is a foundational control in Zero Trust and modern cybersecurity architectures.

MFA protects systems, data, and user accounts from common attack vectors like phishing, credential stuffing, and brute-force attacks - offering an effective, low-friction way to improve enterprise security posture.


Description of the Practice

  • MFA requires at least two of the following: something you know (e.g. password), something you have (e.g. mobile device, hardware token), and something you are (e.g. biometrics).
  • Common implementations include app-based authenticators (e.g. Microsoft Authenticator, Google Authenticator), SMS codes, and hardware keys (e.g. YubiKey).
  • MFA is enforced at key entry points: workforce applications, admin tools, CI/CD systems, cloud infrastructure, and remote access platforms.

How to Practise It (Playbook)

1. Getting Started

  • Prioritise high-value and high-risk access points for initial MFA rollout (e.g. admin consoles, production environments).
  • Choose an MFA provider compatible with your identity systems (e.g. Okta, Azure AD, Duo).
  • Communicate clearly to users - why MFA is needed, how to enrol, and what to expect.
  • Provide fallback and recovery options to reduce friction during rollout.

2. Scaling and Maturing

  • Make MFA mandatory for all privileged accounts and remote access.
  • Extend MFA to developers, contractors, and third parties using SSO or federated access.
  • Implement context-aware MFA (e.g. require only under high-risk conditions or from untrusted devices).
  • Monitor MFA adoption and usage rates, and analyse login behaviour to detect bypass attempts or anomalies.

3. Team Behaviours to Encourage

  • Consider MFA as table stakes - not an optional or burdensome add-on.
  • Support users proactively during rollout to build trust and adoption.
  • Periodically review enforcement coverage and exceptions.
  • Integrate MFA into incident response, threat modelling, and identity reviews.

4. Watch Out For…

  • Poor user experience leading to resistance or workarounds.
  • Over-reliance on weaker second factors (e.g. SMS-based MFA).
  • Unprotected APIs or system accounts that bypass MFA.
  • No clear processes for lost devices, token resets, or emergency access.

5. Signals of Success

  • High MFA adoption and low support friction.
  • Reduced risk from credential-based attacks or account takeovers.
  • Seamless integration with identity providers and SSO flows.
  • MFA coverage includes all privileged access paths and critical systems.
  • Leadership champions MFA as a business enabler, not just a control.
Associated Standards
  • Access is continuously verified and contextual
  • Credentials are short-lived and auditable
  • Security is considered from the start
  • Sensitive data and credentials are managed securely
  • Teams understand the threat models relevant to their domain

Technical debt is like junk food - easy now, painful later.

Awesome Blogs
  • LinkedIn Engineering
  • Github Engineering
  • Uber Engineering
  • Code as Craft
  • Medium.engineering