3.2 Baseline for Security – Multifactor Authentication (MFA)

Needed capacities or functions - Multifactor Authentication (MFA)

  1. Multifactor Authentication ("MFA") should be enabled to access systems containing protected or sensitive information, such as case management systems ("CMS"), document management systems ("DMS"), phone systems, and finance/accounting software, whether through remote or internal access.

Important Considerations and Best Practices 

MFA is a security system that requires more than one authentication method to verify a user's identity for logging in. For example, this can apply to Office 365 (Email/Outlook, SharePoint, OneDrive, and Teams), remote access, and other cloud-based applications. MFA is one of the most effective tools for stopping cyber threat actors who try and log into user accounts.

Many MFA implementations utilize a confirmation code sent to a user email address or SMS-enabled phone number. In addition to these options, MFA systems can use authentication applications on a mobile phone, hardware dongles, facial recognition scanners, and fingerprint scanners as an alternative to email or text messages or to provide an additional layer of security.

Organizations should consider an identity-management solution, such as Okta, Google, or Microsoft 365/Azure, to provide protected access to organizational information systems, where feasible.

Useful websites, resources, and other tools