Multi-Factor Authentication (MFA) has become a standard in security as it adds an additional layer of defence against attacks targeting user’s passwords. With increasing computation power, it becomes more important to not only have strong passwords but also have additional authentication methods to add resilience in case such passwords are compromised.
The three types of MFA:
Despite the enhancements to security provided by implementing MFA, it can often create fatigue among users which can discourage adoption by businesses. Likewise, users that are frustrated with MFA notifications are more likely to click on malicious requests by attackers.
Additionally, businesses with large established infrastructure may face implementation difficulties when rolling out MFA across the whole domain. These may require additional monetary costs or workforce effort.
Therefore, MFA is not always adopted or takes time to adopt. However, the benefits of adopting MFA often outweighs the drawbacks.
Whilst MFA is not a replacement for password complexity or other defence mechanisms, such as rate-limiting or temporary lockouts, it is still a beneficial addition to such defences.
The main benefit is that if all other defences fail and a password is compromised, then an attacker would still require the other authentication methods to gain access. Additionally, in such instances a user’s MFA method would notify them of an attempted login, thus making it easier to identify a password compromise.
Regarding implementation, it is often better to use established providers that can facilitate secure development and deployment of MFA. Whilst it is possible to develop a MFA implementation from scratch at a cheaper costs, the majority of MFA bypasses found in assessments were on custom implementation. This does not mean that established MFA providers are not prone to vulnerabilities, yet they tend to have been tested periodically leading to a stronger foundation.
The following points may be considered when implementing MFA:
Implementing MFA is a great addition to the security of any sized organisation. The benefits tend to outweigh the challenges of implementing MFA and for this reason has become a cyber security standard.