<section title="16.7. Multi-Factor Authentication"><subsection title="Objective"><paragraph
    title="16.7.1."


><![CDATA[<p>Multi-Factor Authentication (MFA) mechanisms are adequately implemented to enhance and maintain security.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.7.2."


><![CDATA[<p>This section provides information and guidance on the establishment and operation of MFA.&nbsp; It is a critical component of Identity and Access Management (IAM).</p>]]></paragraph>
<paragraph
    title="16.7.3."


><![CDATA[<p class="NormS16C7">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p>
<ul>
<li><a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>;</li>
<li><a title="Information security awareness and training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>;</li>
<li><a title="Identification, authentication and authorisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification, Authentication and Authorisation;</a></li>
<li><a title="System access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15483">Section 16.2 – System Access</a>;</li>
<li><a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 – Privileged User Access</a>;</li>
<li><a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 – Privileged Access Management</a>; and</li>
<li><a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="16.7.4."


><![CDATA[<p><!-- [if !supportLists]-->Authentication is a key element of security that provides confirmation of a returning user to a system when making a transaction.&nbsp; In this context a transaction may include browsing, financial operations, and all types of data access, creation, copying and deletion.</p>]]></paragraph>
<paragraph
    title="16.7.5."


><![CDATA[<p>MFA is a security system that verifies a returning user by requiring multiple credentials, which are typically in the form of another factor or type.&nbsp; Initial authentication often requires a username and password followed by a requirement for other (additional) credentials.&nbsp; MFA can enable, for example, valid users’ access to permit credential reset, even if they are using a username and password that may have been compromised.</p>]]></paragraph>
<paragraph
    title="16.7.6."


><![CDATA[<p>Through adequate implementation, MFA can be a strong defence and deterrent against many credential attacks, including brute-force, credential stuffing, and password spraying attacks.&nbsp; It is also an additional defence against many social engineering attacks seeking user credentials.</p>]]></paragraph>
<paragraph
    title="16.7.7."


><![CDATA[<p>MFA requires two or more authentication factors (from a single entity) before authorising system access.&nbsp; MFA requires two elements from any of the three categories of authentication and with the second factor from a different group to the first factor selected.&nbsp;</p>
<p>These factors or groups are:</p>
<ol>
<li><strong>The possession/ownership factor</strong> - Something you have, preferably NOT the device itself but a SEPARATE authentication device such as a token, RFID card or smartcard;</li>
<li><strong>The knowledge factor</strong> - Something you know such as a passcode, One-Time password (OTP), reusable password, pattern or other component of a standard authentication mechanism;</li>
<li><strong>The inherence factor</strong> - Something you are, biological or behavioural characteristics of various types.</li>
</ol>]]></paragraph>
<paragraph
    title="16.7.8."


><![CDATA[<p>Using MFA increases attack resistance by increasing the difficulty of obtaining all necessary authenticators. It is important to note, however, that the strength of an MFA solution is contingent on how robust any of the authentication factors are.</p>]]></paragraph>
<paragraph
    title="16.7.9."


><![CDATA[<p>&nbsp;<!--[endif]-->It is important to use a variety of factors to strengthen attack resistance in order to increase confidence levels in the chosen authentication system.&nbsp; For example, using two factors from the knowledge group is not considered 2FA and is less effective than using factors from two different groups.&nbsp; The knowledge group is the most exposed to attack and compromise through social engineering.</p>]]></paragraph>
<paragraph
    title="16.7.10."


><![CDATA[<p>Additional authentication also assists in managing Privileged Access (refer to Section 16.4 – Privileged Access Management).</p>]]></paragraph>
</block>
<block title="Phishing resistant MFA"><paragraph
    title="16.7.11."


><![CDATA[<p>Although the use of MFA provides improved levels of security than the traditional single-factor authentication, it is imperative to recognise that not all methods provide adequate protection against all attacks.</p>]]></paragraph>
<paragraph
    title="16.7.12."


><![CDATA[<p>The majority of credential stealing is obtained through phishing attacks and adversary in the middle attacks (AiTM). Some traditional MFA is vulnerable to interception or AiTM attacks, where an access token is stolen that contains the MFA claim and can be replayed by the attacker. These types of traditional MFA do not provide the adequate security to mitigate against many advanced phishing attacks.</p>]]></paragraph>
<paragraph
    title="16.7.13."


><![CDATA[<p>Phishing resistant MFA are types of authentication methods that are designed to mitigate these phishing attacks found in some traditional MFA approaches.</p>]]></paragraph>
<paragraph
    title="16.7.14."


><![CDATA[<p>Phishing resistant MFA are methods where attackers cannot replay the stolen access token or manipulate the authentication process. This includes mitigating against social engineering attacks, phishing attacks, and AiTM attacks.</p>]]></paragraph>
<paragraph
    title="16.7.15."


><![CDATA[<p>Phishing resistant MFA relies on cryptographic keys which eliminate the risk of interception and phishing attacks. Methods include:</p>
<ol>
<li>FIDO2/WebAuthn.</li>
<li>Smartcards.</li>
<li>PKI-Based Authentication.</li>
</ol>]]></paragraph>
<paragraph
    title="16.7.16."


><![CDATA[<p>Due to the reliance on cryptographic keys, this typically can involve additional infrastructure and can add additional time and cost to implement across organisations.</p>]]></paragraph>
<paragraph
    title="16.7.17."


><![CDATA[<p>Agencies need to understand what systems and data needs to be protected. Not all entities or transactions may need to implement phishing resistant MFA, however it is essential to consider implementing phishing resistant MFA to sensitive information, where entities have elevated privileges within organisations, and consider adding phishing resistant MFA to PAM policies.</p>]]></paragraph>
<paragraph
    title="16.7.18."


><![CDATA[<p><strong>Traditional MFA with known vulnerabilities</strong></p>
<p>Some methods of MFA are known to be susceptible to phishing threats. Methods, such as SMS based one-time passwords (OTP), email and application-based OTPs have well documented vulnerabilities that can be exploited, particularly through phishing and AiTM attacks.</p>]]></paragraph>
<paragraph
    title="16.7.19."


><![CDATA[<p>SMS have several known vulnerabilities which may make it unsuitable and unsafe for authentication purposes; these include:</p>
<ol>
<li>SIM swapping attacks.</li>
<li>AiTM attacks.</li>
</ol>]]></paragraph>
<paragraph
    title="16.7.20."


><![CDATA[<p><!-- [if !supportLists]--><strong>Email</strong> based OTPs are vulnerable to email account compromises. If an attacker gains access to email accounts they can intercept OTPs via email.</p>]]></paragraph>
</block>
<block title="Adaptive Authentication"><paragraph
    title="16.7.21."


><![CDATA[<p><strong>Adaptive Authentication</strong> is a form of MFA which varies the level or degree of authentication required where an unusual authentication request occurs.&nbsp; For example, out of normal hours, from an unusual geolocation, from an unrecognised device, from an unrecognised IP address and so on.&nbsp; When an unusual authentication request is received, Adaptive Authentication may request additional authenticators such as an MFA token.&nbsp; Some <strong>risk factors</strong> that may trigger Adaptive Authentication include:</p>
<ul>
<li>The location of the access request such as such as a café, airport or home;</li>
<li>The time of the access request such as like late at night, over weekends or during normal working hours;</li>
<li>The type of device, such as a smartphone, tablet, laptop, or unrecognised device;&nbsp;</li>
<li>The type of connection, for example, a public network such as the internet, or a VPN or some other private network; and</li>
<li>A request for access to privileged accounts.</li>
</ul>
<p>&nbsp;</p>]]></paragraph>
<paragraph
    title="16.7.22."


><![CDATA[<p>Adaptive Authentication includes what is sometimes described as transaction identification where known characteristics are compared to the transaction or access request, for example, a known location or common access request.&nbsp; If known characteristics do not match then additional authentication steps may be indicated or required.</p>]]></paragraph>
</block>
<block title="Client-Side Authentication"><paragraph
    title="16.7.23."


><![CDATA[<p>Client-side authentication originates from the user’s device such as laptop, mobile phone, tablet, or home computer.&nbsp; These devices may provide a variety of authentication methods including:</p>
<ul>
<li>Inherence factor/Biometric:</li>
<li style="list-style-type: none;">
<ul>
<li>Fingerprint scans;</li>
<li>Facial recognition;</li>
<li>Voice command/recognition;</li>
<li>Iris scans;</li>
<li>Keystroke dynamics;<br><br></li>
</ul>
</li>
<li>Knowledge factor:
<ul>
<li>PIN codes;</li>
<li>Pattern codes;<br><br></li>
</ul>
</li>
<li>Possession factor:
<ul>
<li>Geofencing;</li>
<li>Bluetooth device proximity/Near field communication (NFC).</li>
</ul>
</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.24."


><![CDATA[<p>It is important to note that some biometric and other measures, for example fingerprints, are susceptible to attacks such as spoofing.&nbsp; To combat these biometric attacks secondary measures are also required, for example pulse-sensing in addition to fingerprint detection in order to ensure the fingerprint presentation is a live person.&nbsp; Clearly not all secondary measures are fully effective by themselves and multiple secondary measures may be required for high risk/high value authorisation requests. FIPS-140 provides guidance to organisations to confirm which hardware meets secure standards.&nbsp;</p>]]></paragraph>
</block>
<block title="Single-User and Multi-User Authorisation"><paragraph
    title="16.7.25."


><![CDATA[<p><strong>Single-User authorisation</strong> involves prompting the account holder to authorise an action being taken on his behalf.&nbsp; For example, single-user authorisation can even prevent fraud as it occurs in a user-friendly manner.&nbsp; Instead of calling the customer to verify the legitimacy of a purchase, credit card companies could request customer authentication for an on-line purchase by sending an authorisation request to the customer through an alternate channel such as a mobile phone.</p>]]></paragraph>
<paragraph
    title="16.7.26."


><![CDATA[<p><strong>Multi-User authorisation</strong> usually requires multiple and separate authentications (usually by other people) in order to authorise a transaction or event, such as establishing an account.&nbsp; This system supports the “separation of duties” concept common in accounting transactions or other high-risk activities.&nbsp; Multi-user authorisation may also assess risk indicators and context (e.g. time, location) to select the authentication components and requirements.</p>]]></paragraph>
</block>
<block title="Multi-Step Authentication"><paragraph
    title="16.7.27."


><![CDATA[<p><strong>Multi-step Authentication</strong> is a design and architectural approach to control access to resources by sequentially using multiple authentication verifiers.&nbsp; Each authentication step grants access to increasingly privileged areas of the system until access to the desired resources is reached (refer also to 16.4 – Privileged Access Management).&nbsp; Multi-Step Authentication can be activated by risk-based “triggers” where risk factors are identified.</p>]]></paragraph>
<paragraph
    title="16.7.28."


><![CDATA[<p><strong>Multi-step Authentication</strong> may require only one authentication factor or mechanism, so it is important not to confuse Multi-Step Authentication with Multi-Factor Authentication.&nbsp; Multi-Step Authentication may not be as secure as MFA and cannot be an appropriate substitute for MFA.&nbsp; A key risk is repeated use of a single authentication factor.</p>]]></paragraph>
<paragraph
    title="16.7.29."


><![CDATA[<p>It is also worth noting, however, that Multi-Step combined with Multi-Factor Authentication is a strong architectural security construct, particularly when a multi-factor request is triggered for accessing a privileged account.</p>]]></paragraph>
</block>
<block title="Perfect Forward Secrecy"><paragraph
    title="16.7.30."


><![CDATA[<p>In addition to the encryption protocols and algorithms discussed in Chapter 17 - Cryptography, the concept of <strong>Perfect Forward Secrecy (PFS)</strong>, often simplified to Forward Secrecy, should also be incorporated into any authentication mechanism design.</p>]]></paragraph>
<paragraph
    title="16.7.31."


><![CDATA[<p><strong>Forward Secrecy</strong> is a property of secure communication protocols that is intended to prevent a compromised encryption key from being used to decrypt previously encrypted traffic.&nbsp; Clearly a compromised key must be immediately replaced in order to maintain the integrity of communications.&nbsp; This mechanism is described as a <strong>“rolling secrets”</strong> technique and is designed to prevent device spoofing and the cloning of mobile clients.</p>]]></paragraph>
<paragraph
    title="16.7.32."


><![CDATA[<p>A <strong>“rolling secret”</strong> key is located on the client device.&nbsp; The client receives two encrypted packages.&nbsp; The first contains another private key and is decrypted by the current private key held on the client device.&nbsp; The new key is used to decrypt the second package and the new private key replaces the existing private key, which is then discarded.&nbsp; The new key is used to encrypt traffic to the authentication server.&nbsp; With each cycle the client replaces the old key with the new key.</p>]]></paragraph>
</block>
<block title="Cryptography"><paragraph
    title="16.7.33."


><![CDATA[<p>The use of encryption is a fundamental component in the security of a Multi-Factor Authentication mechanism.&nbsp; It is essential that only approved cryptographic protocols and algorithms are used,&nbsp;refer to <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
</block>
<block title="Risk Analysis"><paragraph
    title="16.7.34."


><![CDATA[<p>The design of Multi-Factor Authentication should start with a risk review in order to identify any existing and new risks from changing environments, user populations and threat landscapes.&nbsp; Some early steps will include:</p>
<ul>
<li>Review business drivers, existing identity infrastructure, enterprise applications, core platform infrastructure and development plans for each of these;</li>
<li>Ensure any plans for cloud and related services are reviewed and incorporated;</li>
<li>Identify authentication use cases including employees and contractors, consumers, customers, partners, and suppliers.&nbsp; For Digital Government this may also include the General Public for some systems;</li>
<li>Develop baseline requirements;</li>
<li>Undertake a threat analysis for each use case; and</li>
</ul>
<p class="NormS16C7">Select control mechanisms to manage identified risks.</p>]]></paragraph>
<paragraph
    title="16.7.35."


><![CDATA[<p>This risk analysis will inform and direct the development of an authentication architecture to provide robust but usable security for each use case.&nbsp; Some key questions include:</p>
<ul>
<li>How will users access the system or application?</li>
<li>At what stages will users be authenticated?</li>
<li>What authentication factors will provide the appropriate level of authentication and security?</li>
<li>Is the level of authentication appropriate to secure and protect the systems, data and other related assets? and</li>
<li>Is there sufficient capacity to service anticipated workloads?</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.36."


><![CDATA[<p>MFA is an additional way of managing access to systems and data. MFA will only provide additional layers of managing access to systems provided the fundamentals of Identification and Access Management are met. This includes:</p>
<ul>
<li>Implementation of least privileged principles.</li>
<li>Access is removed when not required.&nbsp;</li>
<li>Administration privileges are limited to only users who require these privileges.</li>
<li>Enforcing strong passwords through password policies (when passwords are in use).</li>
</ul>]]></paragraph>
</block>
<block title="Governance and Control"><paragraph
    title="16.7.37."


><![CDATA[<p>Good governance processes assist in identifying potential risks to your systems, data, employees, partners and contractors. This reduces the risk of a breach or failure to comply with legislation and regulation.&nbsp; Good governance processes support the fulfilment of duties of senior and executive management.</p>]]></paragraph>
<paragraph
    title="16.7.38."


><![CDATA[<p>Technology governance must demonstrate effective control, security, effectiveness and clear accountability.&nbsp; Identity Access Management and Authentication are fundamental components in protecting agency systems, data and technology assets and underpinning technology governance structures.&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
<paragraph
    title="16.7.39."


><![CDATA[<p>There are also several national and international legislative and regulatory requirements and accepted international standards which may influence aspects of governance, particularly in relation to data protection and privacy.&nbsp; While not an exhaustive list, these include:</p>
<ul>
<li><!-- [if !supportLists]--><span>New Zealand’s Privacy Act;</span></li>
<li><!-- [if !supportLists]--><span>New Zealand’s Public Records Act;</span></li>
<li><!-- [if !supportLists]--><span style="mso-fareast-language: EN-US;">The EU’s General Data Protection Regulation (GDPR);</span></li>
<li><!-- [if !supportLists]--><span style="color: black; mso-color-alt: windowtext; background: white;">ISO/IEC 27701</span></li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.7.40."


><![CDATA[<p class="NormS16C7">Additional information relating to event logging is contained in:</p>
<table class="table-main" style="width: 100%; height: 411.2px;">
<tbody>
<tr style="height: 18.4px;">
<td style="width: 33.0327%; height: 18.4px;"><strong>Title</strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 18.4px;"><strong>Publisher</strong></td>
<td style="width: 51.4604%; height: 18.4px;"><strong>Source</strong></td>
</tr>
<tr style="height: 84.8px;">
<td style="width: 33.0327%; height: 84.8px;">
<p class="no-uppercase"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Identification Standards</span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 84.8px;">
<p><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NZ Govt</span></p>
<p>&nbsp;</p>
</td>
<td style="width: 51.4604%; height: 84.8px;">
<p><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identity/identification-management/identification-management-standards/" target="_blank">Identification Management Standards | NZ Digital government</a></span></p>
</td>
</tr>
<tr style="height: 50.4px;">
<td style="width: 33.0327%; height: 50.4px;">
<p><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO/IEC 27001</span></strong></p>
</td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 50.4px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO/IEC/ Standards NZ</span></td>
<td style="width: 51.4604%; height: 50.4px;"><span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;"><a rel="noopener noreferrer" href="https://www.iso.org" target="_blank"></a><a rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">ISO - International Organization for Standardization</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NIST Digital Identity Guidelines</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; mso-bidi-font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">NIST</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: white; mso-themecolor: background1;"><a rel="noopener noreferrer" href="https://www.nist.gov/identity-access-management/nist-special-publication-800-63-digital-identity-guidelines" target="_blank">NIST Special Publication 800-63 Digital Identity Guidelines | NIST</a></span></td>
</tr>
<tr style="height: 18.4px;">
<td style="width: 33.0327%; height: 18.4px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">OAuth 2.0</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 18.4px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">IETF OAuth Working Group</span></td>
<td style="width: 51.4604%; height: 18.4px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://oauth.net/2/" target="_blank">OAuth 2.0 — OAuth</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Cloud security guidance -<span style="color: black; mso-color-alt: windowtext; background: white;"> </span>Identity and authentication</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">NCSC UK</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles/principle-10-identity-and-authentication" target="_blank">Principle 10: Identity and authentication - NCSC.GOV.UK</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">FIDO Specifications Overview</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">FIDO Alliance</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://fidoalliance.org/specifications/" target="_blank">User Authentication Specifications Overview - FIDO Alliance</a></span></td>
</tr>
<tr style="height: 55.2px;">
<td style="width: 33.0327%; height: 55.2px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Microsoft Entra ID - Multi-Factor Authentication</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 55.2px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Microsoft</span></td>
<td style="width: 51.4604%; height: 55.2px;"><span><a rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-howitworks" target="_blank">Microsoft Entra multifactor authentication overview - Microsoft Entra ID | Microsoft Learn</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Multifactor Authentication Cheat Sheet</span></strong></td>
<td width="142" valign="top">
<p class="text-center">OWASP</p>
</td>
<td style="width: 51.4604%; height: 36.8px;"><span style="color: black; mso-color-alt: windowtext;"><a rel="noopener noreferrer" href="https://cheatsheetseries.owasp.org/cheatsheets/Multifactor_Authentication_Cheat_Sheet.html" target="_blank">Multifactor Authentication - OWASP Cheat Sheet Series</a></span></td>
</tr>
<tr style="height: 36.8px;">
<td style="width: 33.0327%; height: 36.8px;"><strong><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">Implementing Phishing Resistant MFA</span></strong></td>
<td class="text-center" style="text-align: center; width: 15.4722%; height: 36.8px;"><span style="font-size: 10.0pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: &#039;Times New Roman&#039;; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">CISA</span></td>
<td style="width: 51.4604%; height: 36.8px;"><span><a rel="noopener noreferrer" href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" target="_blank">Implementing Phishing-Resistant MFA</a></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title=" Risk Analysis"><paragraph
    title="16.7.41.R.01."

    tags="Governance,Information Security Documentation,Access Control,Risk Assessment"


><![CDATA[<p>The requirement for an agency information security policy is discussed and described in <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.&nbsp; An essential part of any security policy is the assessment of risk and the inclusion of requirements for securing access to systems, applications and data.</p>]]></paragraph>
<paragraph
    title="16.7.41.R.02."

    tags="Governance,Access Control,Passwords,Risk Assessment"


><![CDATA[<p>A risk analysis is fundamental to the design, implementation and maintenance of Multi-Factor Authentication (MFA) processes and will inform and direct the development of requirements and an authentication architecture to provide robust but usable security.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.7.41.C.01."

    tags="Governance,Access Control,Passwords,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="6948"
><![CDATA[<p class="Default"><span>Agencies </span><span>MUST undertake a risk analysis before designing and implementing MFA.</span></p>]]></paragraph>
</block>
<block title="System Architecture and Security Controls"><paragraph
    title="16.7.42.R.01."

    tags="Governance,Access Control,Passwords"


><![CDATA[<p>Security controls should support security while enabling authorised user access.&nbsp; The system architecture should be sufficiently comprehensive to support this objective.</p>]]></paragraph>
<paragraph
    title="16.7.42.R.02."

    tags="Access Control,Passwords,Authentication,MFA"


><![CDATA[<p>External facing systems and authenticating to third-party services exposes additional risk to the organisation. MFA provides an additional layer to help an organisation manage risk of systems compromise through authentication attacks.</p>]]></paragraph>
<paragraph
    title="16.7.42.R.03."

    tags="Access Control,Passwords,Authentication,MFA"


><![CDATA[<p>While phishing-resistant MFA methods, such as hardware security keys or biometric authentication, offer stronger protection (compared to non-phishing-resistant MFA), some of these methods may not always be feasible for all users of systems. Therefore, while we strongly encourage the adoption of phishing resistant MFA wherever possible, any form of MFA is considered an improvement over relying solely on passwords.</p>]]></paragraph>
<paragraph
    title="16.7.42.R.04."

    tags="Access Control,Passwords,Authentication,MFA"


><![CDATA[<p>Where devices or systems do not support MFA, organisations are encouraged to implement appropriate compensating controls. These measures can help mitigate the risks associated with relying solely on passwords.</p>]]></paragraph>
<paragraph
    title="16.7.42.C.01."

    tags="Technical,Access Control,Authentication,MFA"


    classification="All Classifications"
    compliance="Must"
    cid="7563"
><![CDATA[<p>Where an agency has external facing systems, cloud-based services, or is authenticating to third-party services services, they MUST:</p>
<ul>
<li>require MFA for all user accounts; and</li>
<li>implement a secure, multi-factor process to allow entities to reset their standard user credentials.</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.42.C.02."

    tags="Governance,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Must"
    cid="6953"
><![CDATA[<p>Where an agency has implemented MFA they MUST:</p>
<ul>
<li>require MFA for administrative or other high privileged users; and</li>
<li>implement a secure, multi-factor process to allow entities to reset their standard user credentials.</li>
</ul>]]></paragraph>
<paragraph
    title="16.7.42.C.03."

    tags="Technical,Access Control,Passwords,Authentication"


    classification="All Classifications"
    compliance="Must"
    cid="7564"
><![CDATA[<p>Agencies MUST implement MFA on all user accounts with <strong>remote</strong> access to organisational resources.</p>]]></paragraph>
<paragraph
    title="16.7.42.C.04."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="7565"
><![CDATA[<p>Agencies SHOULD implement MFA on all user accounts with access to organisational resources.<span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-bidi-font-family: &#039;Times New Roman&#039;; color: windowtext; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU;"> </span></p>]]></paragraph>
<paragraph
    title="16.7.42.C.05."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="7566"
><![CDATA[<p>Where agencies have implemented MFA, they SHOULD implement phishing-resistant MFA on administration accounts.<span style="font-size: 10.5pt; font-family: &#039;Open Sans&#039;,sans-serif; mso-bidi-font-family: &#039;Times New Roman&#039;; color: windowtext; mso-ansi-language: EN-AU; mso-fareast-language: EN-AU;"> </span></p>]]></paragraph>
<paragraph
    title="16.7.42.C.06."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="7567"
><![CDATA[<p>Agencies SHOULD use phishing-resistant MFA when authenticating users to systems.</p>]]></paragraph>
<paragraph
    title="16.7.42.C.07."

    tags="Technical,Access Control,Passwords,Authentication,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="6952"
><![CDATA[<p>The design of an agency MFA SHOULD include consideration of:</p>
<ul>
<li>Risk identification;</li>
<li>Level of security and access control appropriate for each aspect of an organisation’s information systems (data, devices, equipment, storage, cloud, etc.)</li>
<li>A formal authorisation process for user system access and entitlements;</li>
<li>Logging,&nbsp;monitoring and reporting of activity;</li>
<li>Review of logs for orphaned accounts and inappropriate user access including unsuccessful authentication;</li>
<li>Identification of error and anomalies which may indicate inappropriate or malicious activity;</li>
<li>Incident response;</li>
<li>Remediation of errors;</li>
<li>Suspension and/or revocation of access rights where policy violations occur;</li>
<li>Capacity planning.</li>
</ul>]]></paragraph>
</block>
<block title="Integration with Policy"><paragraph
    title="16.7.43.R.01."

    tags="Governance,Information Security Documentation,Access Control,Passwords,MFA"


><![CDATA[<p>The requirement for an agency information security policy is discussed and described in <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.&nbsp; Privileged Access Management policy is discussed in <a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 - Privileged Access Management</a>.</p>]]></paragraph>
<paragraph
    title="16.7.43.C.01."

    tags="Governance,Information Security Documentation,Access Control,Passwords,MFA"


    classification="All Classifications"
    compliance="Should"
    cid="6956"
><![CDATA[<p>The design of an organisations MFA system SHOULD be integrated with the agency’s Information Security Policy, the agency’s Privileged Access Management (PAM) Policy, and any additional agency password policies.</p>]]></paragraph>
</block>
<block title="User Training"><paragraph
    title="16.7.44.R.01."

    tags="Governance,Access Control,Passwords"


><![CDATA[<p>It is important that users understand and have continued awareness of risks and threats to authentication credentials, in order to maintain the integrity of the credentials and to maintain the security of the systems being accessed.</p>]]></paragraph>
<paragraph
    title="16.7.44.R.02."

    tags="Governance,Access Control,Passwords,MFA"


><![CDATA[<p>MFA introduces some complexity and may require the use of specific devices, hardware or applications.&nbsp; Training is essential to increase user awareness and maintain adequate security practices.</p>]]></paragraph>
<paragraph
    title="16.7.44.C.01."

    tags="Governance,Access Control,Passwords,MFA"


    classification="All Classifications"
    compliance="Must"
    cid="6960"
><![CDATA[<p>When agencies’ implement MFA they MUST ensure users have an understanding of the risks, and include appropriate usage and safeguards for MFA in the organisation’s user training and awareness programmes.</p>]]></paragraph>
</block>
</subsection>
</section>
