All Controls
Security Control

Multi-Factor Authentication (MFA)

NIST ProtectPR.AC-7CIS Control 6: Access Control Management

What This Control Means

Multi-factor authentication (MFA) requires users to present two or more distinct forms of evidence before gaining access to an account or system. These factors typically fall into three categories: something you know (a password), something you have (a phone or hardware token), and something you are (a fingerprint or facial scan). By requiring more than one factor, MFA dramatically reduces the risk that a compromised password alone can lead to unauthorized access.

Passwords by themselves are an increasingly unreliable security boundary. Credential stuffing attacks, phishing campaigns, and large-scale data breaches regularly expose millions of username-and-password pairs. When an attacker obtains a valid password, MFA serves as the critical second barrier that prevents account takeover. Studies consistently show that MFA blocks over 99% of automated credential-based attacks.

For small and mid-sized businesses, MFA is one of the highest-impact, lowest-cost security improvements available. Most major cloud platforms, email providers, and SaaS applications offer built-in MFA at no additional charge. Authenticator apps such as Microsoft Authenticator, Google Authenticator, or Duo Mobile provide time-based one-time passwords (TOTP) that are significantly more secure than SMS-based codes, which can be intercepted through SIM-swapping attacks.

Implementing MFA should be treated as a foundational security control rather than an optional enhancement. Organizations that delay MFA adoption expose themselves to preventable breaches that can result in data loss, regulatory penalties, and reputational harm. A phased rollout starting with the most critical systems (email, VPN, financial applications) allows organizations to build user familiarity while rapidly reducing their attack surface.

Why Insurers Care

MFA is one of the most commonly required controls on cyber liability insurance applications. Many insurers now treat the absence of MFA as an automatic disqualifier or a reason to significantly increase premiums. Underwriters view MFA as a baseline expectation because its absence is correlated with a dramatically higher likelihood of ransomware incidents and business email compromise claims.

Insurance carriers increasingly ask granular questions about where MFA is enforced: email, remote access, privileged accounts, and cloud administration. Organizations that can demonstrate comprehensive MFA coverage across all critical systems are more likely to receive favorable terms, lower deductibles, and broader coverage. Conversely, a breach that occurs in a system where MFA was available but not enabled may result in a coverage dispute or claim denial.

Industry-Specific Notes

Healthcare (HIPAA)

Under HIPAA, MFA is considered an addressable safeguard for access control (45 CFR 164.312(d)). While not explicitly mandated, covered entities must document their rationale if they choose not to implement it. The HHS Office for Civil Rights has increasingly cited lack of MFA in enforcement actions following breaches involving electronic protected health information (ePHI).

Legal (ABA Guidelines)

The ABA Formal Opinion 477R recommends MFA as part of a lawyer's duty of competence when transmitting confidential client information. Many state bar ethics opinions now reference MFA as a reasonable safeguard. Law firms are high-value targets for attackers seeking privileged communications, making MFA essential for protecting attorney-client privilege.

Financial Services (GLBA/PCI-DSS)

GLBA Safeguards Rule updates require MFA for any individual accessing customer information systems. PCI-DSS Requirement 8.3 mandates MFA for all non-console administrative access and all remote network access to cardholder data environments. FINRA and SEC examination priorities regularly include MFA verification.

Retail / E-commerce (PCI-DSS)

PCI-DSS Requirement 8.3 mandates MFA for all personnel with non-console administrative access to systems handling cardholder data. Retail organizations with e-commerce platforms must also secure customer-facing administrative portals with MFA. Failure to implement MFA can result in PCI non-compliance findings during qualified security assessor (QSA) audits.

Government / Defense (CMMC 2.0)

CMMC Level 2 requires MFA per NIST 800-171 control IA.L2-3.5.3 for all network access to privileged and non-privileged accounts. Executive Order 14028 mandates MFA across all federal agencies and their contractors. State and local governments receiving federal grants increasingly face MFA requirements as a condition of funding.

Implementation Steps

Inventory all business-critical accounts and systems that support MFA

Enable MFA on email accounts first, as email is the highest-risk vector for business email compromise

Roll out MFA to VPN, cloud services, and financial systems in the next phase

Train employees on using authenticator apps (prefer TOTP apps over SMS-based codes)

Document the MFA policy, including enforcement procedures and exception handling

Establish a process for MFA recovery when employees lose their authentication device

Want to know how your organization measures up on this control?

Take the free assessment →