cloudsecurityalliance.org Open in urlscan Pro
2606:4700:3108::ac42:2855  Public Scan

URL: https://cloudsecurityalliance.org/blog/2022/04/28/mfa-is-only-as-effective-as-we-want-it-to-be/
Submission: On May 21 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET /search/

<form action="/search/" class="input-pair u-mb0" method="get" role="search"><label><span class="u-screen-reader">Search for:</span></label><input autocomplete="off" class="c-megamenu__search-input" name="s"
    placeholder="Search CSA resources, tools, research publications and more…" title="Search for:" type="text" value=""><button class="c-button c-button--secondary" disabled=""><svg class="svg-inline--fa fa-search fa-w-16" aria-hidden="true"
      focusable="false" data-prefix="fas" data-icon="search" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" data-fa-i2svg="">
      <path fill="currentColor"
        d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
      </path>
    </svg><!-- <i class="fas fa-search"></i> Font Awesome fontawesome.com --></button>
  <div class="c-button c-button--expand"><svg class="svg-inline--fa fa-search fa-w-16" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" data-fa-i2svg="">
      <path fill="currentColor"
        d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
      </path>
    </svg><!-- <i class="fas fa-search"></i> Font Awesome fontawesome.com --></div>
  <div class="c-button c-button--close"><svg class="svg-inline--fa fa-times fa-w-11 i" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="times" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 352 512" data-fa-i2svg="">
      <path fill="currentColor"
        d="M242.72 256l100.07-100.07c12.28-12.28 12.28-32.19 0-44.48l-22.24-22.24c-12.28-12.28-32.19-12.28-44.48 0L176 189.28 75.93 89.21c-12.28-12.28-32.19-12.28-44.48 0L9.21 111.45c-12.28 12.28-12.28 32.19 0 44.48L109.28 256 9.21 356.07c-12.28 12.28-12.28 32.19 0 44.48l22.24 22.24c12.28 12.28 32.2 12.28 44.48 0L176 322.72l100.07 100.07c12.28 12.28 32.2 12.28 44.48 0l22.24-22.24c12.28-12.28 12.28-32.19 0-44.48L242.72 256z">
      </path>
    </svg><!-- <div class="i fas fa-times"></div> Font Awesome fontawesome.com --></div>
</form>

POST /mailing-lists/blog

<form class="mailing-list-blog personal-data-submission c-form c-form--small" action="/mailing-lists/blog" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
    value="z3XUv-sRTFkeK9tnJpEgY2ng3JpEku493j9uHp8mcYcd7GLqblWl8HPs3V2V6dv7RAkR8KTr2cioEYw0P6-U-Q" autocomplete="off">
  <div class="c-form__item-group c-form__item-group--duo  c-form__item-group--actionable-right c-form__item-group--no-border">
    <div class="c-form__item u-mt20"><input type="text" name="email" id="email" placeholder="Email address" required="required"></div>
    <div class="c-form__item">
      <script src="https://www.recaptcha.net/recaptcha/api.js" async="" defer=""></script>
      <div data-size="invisible" data-sitekey="6Ld1CJ8UAAAAAKB00zXbZ4qXAa6U0PZd3ixvg0Ee" data-callback="joinMailingListBlog" class="g-recaptcha ">
        <div class="grecaptcha-badge" data-style="bottomright"
          style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
          <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
              src="https://www.recaptcha.net/recaptcha/api2/anchor?ar=1&amp;k=6Ld1CJ8UAAAAAKB00zXbZ4qXAa6U0PZd3ixvg0Ee&amp;co=aHR0cHM6Ly9jbG91ZHNlY3VyaXR5YWxsaWFuY2Uub3JnOjQ0Mw..&amp;hl=de&amp;v=M-QqaF9xk6BpjLH22uHZRhXt&amp;size=invisible&amp;cb=mo1zlkg1jrs4"
              width="256" height="60" role="presentation" name="a-9hxwpvnu6x32" frameborder="0" scrolling="no"
              sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
          <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
            style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
        </div>
      </div>
      <input type="submit" name="commit" value="Sign up" class="c-button c-button--primary c-button--small" data-disable-with="Submitting...">
    </div>
  </div>
</form>

POST /mailing-lists

<form class="mailing-list personal-data-submission c-form c-form--small" action="/mailing-lists" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
    value="z3XUv-sRTFkeK9tnJpEgY2ng3JpEku493j9uHp8mcYcd7GLqblWl8HPs3V2V6dv7RAkR8KTr2cioEYw0P6-U-Q" autocomplete="off">
  <div class="c-form__item-group c-form__item-group--duo  c-form__item-group--actionable-right c-form__item-group--no-border">
    <div class="c-form__item u-mt20"><input type="text" name="email" id="email" placeholder="Email address" required="required"></div>
    <div class="c-form__item">
      <script src="https://www.recaptcha.net/recaptcha/api.js" async="" defer=""></script>
      <div data-size="invisible" data-sitekey="6Ld1CJ8UAAAAAKB00zXbZ4qXAa6U0PZd3ixvg0Ee" data-callback="joinMailingList" class="g-recaptcha ">
        <div class="grecaptcha-badge" data-style="none" style="width: 256px; height: 60px; position: fixed; visibility: hidden;">
          <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
              src="https://www.recaptcha.net/recaptcha/api2/anchor?ar=1&amp;k=6Ld1CJ8UAAAAAKB00zXbZ4qXAa6U0PZd3ixvg0Ee&amp;co=aHR0cHM6Ly9jbG91ZHNlY3VyaXR5YWxsaWFuY2Uub3JnOjQ0Mw..&amp;hl=de&amp;v=M-QqaF9xk6BpjLH22uHZRhXt&amp;size=invisible&amp;cb=o4uo6gn78mkx"
              width="256" height="60" role="presentation" name="a-t277gbm8r077" frameborder="0" scrolling="no"
              sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
          <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response"
            style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
        </div><iframe style="display: none;"></iframe>
      </div>
      <input type="submit" name="commit" value="Sign up" class="c-button c-button--primary c-button--small" data-disable-with="Submitting...">
    </div>
  </div>
</form>

Text Content

CircleEventsBlog
Membership
Join as a Business
Cloud Customers
Cloud Solution Providers
SaaS Solution Providers
Current Business Members
CxO Trust
Contact Us
Join as an Individual
Regional Chapters
Circle Community Forum
Research Working Groups
STAR Program
STAR Registry
STAR Home
Submit to Registry
Provide Feedback
What is the STAR Registry?
Learn how to stay compliant in the cloud.
CCAK Training
Governance, Risk & Compliance Tools
Cloud Controls Matrix (CCM)
Consensus Assessment Initiative Questionnaire (CAIQ)
GDPR Code of Conduct
STAR Level 1
At level one organizations submit a self-assessment.
View companies at level one
Learn about level one
STAR Level 2
At level two organizations earn a certification or third-party attestation.
View companies at level two
Learn about level two
CSA Approved STAR Assessment Firms
Certificates & Training
Events
Learn and network while you earn CPE credits.
Events
Virtual Events & Webinars
Certificates & Training
Certificate of Cloud Security Knowledge (CCSK)
Certificate of Cloud Auditing Knowledge (CCAK)
Train my entire team
Training Instructors
Become an Instructor
Training Partners
Become a Training Partner
Research
CSA Research
Latest Research
Working Groups
Open Peer Reviews
Research Topics
Zero Trust Advancement Center
CxO Trust
CloudBytes Webinars
Industry Specific Research
Financial Services
Healthcare
Getting Started with CSA Research
Best practices for cloud security
Assess your compliance to cloud standards
Security questionnaire for vendors
The top threats to cloud computing
Zero Trust Architecture
View more
Awards & Recognition
Ron Knode Awards
Research Fellows
Architectures and Components
Enterprise Architecture
Hybrid Cloud Security
Emerging Technologies
Blockchain/Distributed Ledger
Internet of Things (IoT)
Quantum-safe Security
Securing DevOps
Application Containers and Microservices
DevSecOps
Serverless
Security Services
Enterprise Resource Planning
Cloud Key Management
Security as a Service
Zero Trust
Threat Intelligence
Global Security Database (GSD)
Incident Response
Top Threats
View all topics
Search for:


Membership
Join as a Business
Cloud Customers
Cloud Solution Providers
SaaS Solution Providers
Current Business Members
CxO Trust
Contact Us
Join as an Individual
Regional Chapters
Circle Community Forum
Research Working Groups

--------------------------------------------------------------------------------

STAR Program
STAR Registry
STAR Home
Submit to Registry
Provide Feedback
What is the STAR Registry?
Learn how to stay compliant in the cloud.
CCAK Training
Governance, Risk & Compliance Tools
Cloud Controls Matrix (CCM)
Consensus Assessment Initiative Questionnaire (CAIQ)
GDPR Code of Conduct
STAR Level 1
At level one organizations submit a self-assessment.
View companies at level one
Learn about level one
STAR Level 2
At level two organizations earn a certification or third-party attestation.
View companies at level two
Learn about level two
CSA Approved STAR Assessment Firms

--------------------------------------------------------------------------------

Certificates & Training
Events
Learn and network while you earn CPE credits.
Events
Virtual Events & Webinars
Certificates & Training
Certificate of Cloud Security Knowledge (CCSK)
Certificate of Cloud Auditing Knowledge (CCAK)
Train my entire team
Training Instructors
Become an Instructor
Training Partners
Become a Training Partner

--------------------------------------------------------------------------------

Research
CSA Research
Latest Research
Working Groups
Open Peer Reviews
Research Topics
Zero Trust Advancement Center
CxO Trust
CloudBytes Webinars
Industry Specific Research
Financial Services
Healthcare
Getting Started with CSA Research
Best practices for cloud security
Assess your compliance to cloud standards
Security questionnaire for vendors
The top threats to cloud computing
Zero Trust Architecture
View more
Awards & Recognition
Ron Knode Awards
Research Fellows
Architectures and Components
Enterprise Architecture
Hybrid Cloud Security
Emerging Technologies
Blockchain/Distributed Ledger
Internet of Things (IoT)
Quantum-safe Security
Securing DevOps
Application Containers and Microservices
DevSecOps
Serverless
Security Services
Enterprise Resource Planning
Cloud Key Management
Security as a Service
Zero Trust
Threat Intelligence
Global Security Database (GSD)
Incident Response
Top Threats
View all topics

--------------------------------------------------------------------------------

Circle

--------------------------------------------------------------------------------

Events

--------------------------------------------------------------------------------

Blog

--------------------------------------------------------------------------------


MFA IS ONLY AS EFFECTIVE AS WE WANT IT TO BE


Home
Industry Insights
MFA Is Only As Effective As We Want It To Be

Blog Article Published: 04/28/2022




Written by Authomize

Good cybersecurity is all about getting the basics right.

Sure, AI and other advanced technologies help us to cyber better, faster,
stronger, etc. But the really important work is all about actually using the
most basic of tools to fend off the vast majority of attacks.

One of the most glaring examples of a good security measure that is woefully
underused is multi-factor authentication (MFA).


IDENTITY IS THE NEW BATTLEGROUND

In the cloud-centric era, where we use our identity to access the apps and
services on someone else’s network, the good fight has centered on getting
identity and access security right.

The problem is that a lot of us are still getting a lot of those basics wrong.

In its recent “Cyber Signals” report, Microsoft declared that, “Identity is the
new battleground, but most are unprotected against attacks.”

Looking at its internal numbers, Microsoft reports that only 22% of Azure Active
Directory organizations are using what it terms as “strong authentication” (read
MFA) for securing their accounts.

This is beyond irksome, given how the folks in Redmond have been spreading the
good word about MFA for years now, repeating the mantra that “MFA can block over
99.9% of account compromise attacks.”

Considering the high-level effectiveness of standard MFA, it boggles the mind as
to why it is so underutilized.


WHY AREN’T ORGANIZATIONS USING MFA?

MFA is like a seatbelt — easy to use and highly effective in most cases. And yet
people will always have an excuse as to why they don’t use it.

Added friction to productivity and UX is one of the most common responses, with
many employees griping about having to add an extra step to logging in.

Some will ask, “What if I forgot my phone today? Can I not log in?”

Lack of time and resources from the security team to get everyone enrolled is
another reason that often gets cited. Though when it comes to the basics like
adding MFA to your Microsoft accounts, costs for the service is less of a direct
issue — even if the implementation might be.

When it comes to 3rd party services, there may be extra costs associated with
adding MFA that could deter an organization from doing the right thing.

None of these are good reasons not to have MFA, which has reached a critical
point of necessity. Passwords are not nearly enough to protect your access to
cloud services like your IaaS, SaaS, and hosted data.

Ideally, we could just enroll everyone in MFA, but given the aforementioned
challenges, we have to pick our battles.


3 TIPS FOR SECURING YOUR PRIVILEGED ACCESS

When malicious actors target your organization, the goal is to ensure that they
walk away with as little as possible for their troubles.

We need to prioritize our attention on securing the accounts that can do the
most damage if they are compromised — namely our identities with privileged
access.

Ensuring that these valuable identities have MFA enabled should be our top
priority.

Here are a few good tips for getting started.

1. KNOW WHERE TO START

Start by identifying these privileged identities. In some cases they will simply
be listed as admins. But it is not always so clear.

You also need to detect shadow admins and others with access privileges, either
directly, through group memberships, or roles that can reach your sensitive
crown jewels like customer data or that can be exploited for privilege
escalation.

Identifying these undefined admins is often harder than it sounds because they
lack visibility over all the different access paths that an identity may have to
their assets.

2. USE FEDERATED ACCESS

Using an identity provider like Azure AD, Ping, or Okta, will give you an easier
way to determine and manage who has MFA enabled. If any of your privileged
accounts do not, then require them to do so.

3. DISALLOW UNFEDERATED ACCESS

For all the apps and services where possible, bar access to local IAM users.
This is best practice in general, but has added value when talking about more
sensitive assets.

In cases where you can’t use federated access, use tools to track access usage
activity, gain visibility, and ensure that people cannot access your valuable
assets without MFA enabled.


A FIGHTING CHANCE

Along with the suboptimal MFA 22% adoption figure, there are reasons to be
hopeful. The Microsoft authors tell us that basic security hygiene still
protects against 98% of attacks, citing MFA and applying Least Privilege as
important measures for mitigating risks.

That’s good news because it means that organizations stand a fighting chance
against the threats to their identity perimeter. And that threat is rising.

The report claims that in 2021, “Azure Active Directory detected and blocked
more than 25.6 billion attempts to hijack enterprise customer accounts by
brute-forcing stolen passwords.”

So how many didn’t they block? How many more are coming?

As we move through the tumult of early 2022, we can expect these attempts to
increase further.

Preparing for whatever comes next will require organizations to develop a
technology adoption strategy that enables them to enforce their Authentication
and Authorization policies. Taking responsibility for their security will mean
using all the defensive tools at our disposal — starting with the most basic.

Identity and Access Management

Share this content on your favorite social network today!



Sign up to receive CSA's latest blogs



This list receives 1-2 emails a month.

RELATED ARTICLES:

KNOW YOUR CLOUD SECURITY ACRONYMS: CWPP, CSPM, CIEM AND CNAPP

Published: 05/20/2022

PRIORITIZING CLOUD SECURITY THREATS: WHAT YOU NEED TO KNOW

Published: 05/18/2022

WHY MACHINE IDENTITY MANAGEMENT HAS BECOME A CRITICAL PRIORITY FOR ORGANIZATIONS

Published: 05/09/2022

SECURITY SERVICE EDGE (SSE) IS THE WAY TO GO, BUT HOW DO YOU CHOOSE?

Published: 05/02/2022

This website uses third-party profiling cookies to provide services in line with
the preferences you reveal while browsing the Website. By continuing to browse
this Website, you consent to the use of these cookies. If you wish to object
such processing, please read the instructions described in our Privacy Policy.

I understand
×

© 2009–2022 Cloud Security Alliance.
All rights reserved.







SIGN UP FOR CSA'S MAILING LIST





CORPORATE MEMBERSHIP

Cloud CustomersCloud Solution ProvidersSaaS Solution Providers

JOIN AS AN INDIVIDUAL

Circle Community ForumChaptersWorking Groups

RESEARCH

Download PublicationsView Working Groups

FIND A...

Cloud ConsultantCloud Service ProviderView All Topics

CERTIFICATES

CCSKCCAK

EVENTS

AmericasEMEAAPAC

EDUCATION

BlogVirtual Events & WebinarsTraining

POPULAR RESOURCES

Security GuidanceCCMCAIQSTARGDPR

ABOUT CSA

Contact UsPress ReleasesAffiliatesPress Coverage

OUR TEAM

Board of DirectorsManagement & Staff

LEGAL

Privacy NoticeTerms & Conditions

CLOUD SECURITY GLOSSARY

▴