Blog | G5 Cyber Security

MFA Resilience: Avoiding Single Points of Failure

TL;DR

Yes, many current multi-factor authentication (MFA) methods *do* rely on single points of failure. This guide explains how to improve your MFA setup for better cyber security by diversifying your options and planning for disruptions.

Improving MFA Resilience

Most MFA implementations today centre around SMS, authenticator apps or email codes. While better than nothing, these all have weaknesses. Here’s a practical guide to making your MFA more robust:

1. Understand the Risks

2. Diversify Your Authentication Methods

Don’t put all your eggs in one basket! Offer users multiple MFA options:

  1. Authenticator Apps: Google Authenticator, Microsoft Authenticator, Authy are common choices.
  2. Hardware Security Keys (FIDO2/WebAuthn): YubiKey, SoloKeys offer strong protection against phishing and SIM swapping. These use cryptographic keys stored on the device.
  3. Backup Codes: Generate a set of one-time use codes to be stored securely offline.
  4. Biometrics (where appropriate): Fingerprint or facial recognition integrated with hardware security keys or devices.

Example of generating backup codes (using Google’s 2-Step Verification settings – process varies by provider):

Within your account security settings, look for 'Backup Codes'. Generate a new set and download/store them securely.

3. Implement Passwordless Authentication

Passwordless methods reduce reliance on passwords *and* MFA codes:

Note: Passkey support is growing but isn’t universal yet.

4. Plan for Recovery Scenarios

  1. Self-Service Reset: Allow users to reset MFA if they lose access, *with* strong identity verification steps (e.g., knowledge-based questions, proof of ownership).
  2. Admin Recovery Process: Define a clear process for administrators to assist users who can’t recover their accounts themselves. This should involve multiple levels of approval.
  3. Emergency Access Accounts: Create highly secured emergency access accounts with separate MFA configurations (and limited privileges) for critical situations.

Example of checking recovery options in Microsoft Entra ID:

In the Azure portal, navigate to 'Users' -> [User] -> 'Authentication methods'. Review registered methods and recovery phone numbers/emails.

5. Monitor MFA Usage & Security Events

Use your SIEM (Security Information and Event Management) system or security logs to detect anomalies.

6. Regularly Review & Update

Exit mobile version