Multifactor authentication (MFA) is a method of authenticating users when they log into specific resources like applications, online accounts or VPNs. In addition to a username and password, users must utilize at least one additional verification method, if not more.
The goal of multifactor authentication is to make it difficult for unauthorized people to gain access to a system. It is becoming widely implemented in industries that understand the need for good cybersecurity practices — including finance and even popular gaming platforms — to require extra verification when someone is signing in. It’s widely agreed that MFA is a staple of good cybersecurity practices.
Attack methods like credential harvesting and phishing are becoming more prevalent in the current threat landscape. When a threat actor gains access to a system through an employee’s credentials, they can deal immense damage by following up their initial attack with malware, such as ransomware or botnets. While encouraging good security hygiene and conducting mandatory training can decrease the odds of people in an organization falling for credential harvesting and phishing attacks, MFA is another crucial line of defense for keeping threat actors at bay.
Implementing MFA makes it more difficult for a threat actor to access a business’ environment and information systems, even if credentials like passwords or PINs have been compromised. This extra layer of protection notifies the SOC if an MFA attempt has failed, allowing the security team to identify gaps in their system before any damage is done. In addition to increasing protection, MFA is fairly straightforward and user-friendly.
When a user creates an account somewhere, they are required to provide several pieces of information to fulfill identification and authentication processes, including a username and password that represents their identity within the system. The service will then inform the user which additional verification methods (if any) are needed to finalize their account.
These additional methods typically consist of different factors:
When someone signs into that service later on, the system will ask for whatever information they submitted when they signed up. They will only get access to the system when they’ve correctly verified through the necessary methods. Whether this process stops at credentials or requires multiple forms of authentication depends on the service.
While MFA is the general term for requiring multiple factors of verification, there are specific terms that are used to describe unique authentication technologies or scenarios, including the following:
The platform or service that a user is accessing determines which type of authentication to use and which methods are enabled.
There are many ways for users to verify their identity, and the list is growing. Some common formats include:
Many people can identify using these methods in their day-to-day lives, whether they’re focused on cybersecurity or not. MFA is becoming a more common — and more integral — part of society in many different ways.
Multifactor authentication has become very common; users from all types of platforms and industries have been using MFA without even knowing it!
Many services use 2FA when someone logs into their online platform. After someone submits their login credentials, the platform will randomly generate a code sent to them via either a phone or email address identified when the user originally signed up. The user will then input that code into the platform for secure access.
Another example of authentication comes from identity and access management (IAM) companies that provide B2B authentication methods. Users will be required to create an account with the third-party company and download a companion app to their mobile devices. Upon logging into the system, the platform sends a notification to the app and asks the user to verify that they are signing in. This example of out-of-band authentication is very common in the current working landscape.
One of the best methods of day-to-day protection is multifactor authentication, but that doesn’t mean it’s impenetrable.
While MFA greatly reduces the likelihood of a successful attack, it can still be bypassed in various ways. It is possible through phishing, malware and meddler-in-the-middle attacks. Sometimes, it’s even user error — occasionally, users will enable authentication requests even if they don’t know their origin. They’ll simply assume the request is coming from a background process, or they forgot they had asked for access.
Even though MFA isn’t a concrete defense plan by itself, it should absolutely be implemented in a system. For additional protection, SOCs can look to endpoint protection solutions like Cortex XDR or SOAR solutions like Cortex XSOAR to identify potential breaches and automate responses.