Multi-factor Authentication
This page provides a template and guidance to assist organisations in documenting their approach to Multi-Factor Authentication, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Estimated reading time: 6 minutes
Instruction
The Essential Eight sections of a System Security Plan (SSP) should document the Essential Eight Maturity levels associated with implementation of a system. As with other sections of the SSP, information in this section should be documented according to the relevant controls outlined in ASD’s ISM and the SSP Annex.
All template text refers to a typical implementation of a system built using the Blueprint, and includes reference to organisational policies, processes and technical configurations to be implemented in addition to the technical controls that may be configured using guidance from the Blueprint. Any implementation implied by the below text should not be considered as prescriptive of how the organisation must scope, build, document, or assess its system.
When completing the below template, organisations should insert and update information where relevant to ensure it accurately represents the Essential Eight Maturity levels associated with implementation of their system. When complete, remove any instructional boxes throughout.
Blueprint guidance
For applicable government organisations to meet the minimum requirements established under the Protective Security Policy Framework (PSPF) maturity model, these organisations must implement Maturity Level Two for each of the below components of ASD’s Essential Eight Maturity Model.
As with implementation of ISM controls, the Blueprint does not itself achieve any particular Essential Eight Maturity levels, but rather assists organisations in designing and building systems to achieve their desired maturity level based on their own operating context.
Applicability
The Multi-Factor Authentication (MFA) mitigation strategy is applicable to all access management within <SYSTEM-NAME>
.
In particular, this is applicable to the configuration of Microsoft Entra ID AND ON PREMISES ACTIVE DIRECTORY
to provide identity and access management (IAM) services for <SYSTEM-NAME>
, particularly for governing access to Microsoft 365 services and to managed <SYSTEM-NAME>
Windows endpoints.
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Maturity level
Targeted: | <TARGET-LEVEL> |
Currently Assessed: | <ASSESSED-LEVEL> |
Implementation
Authentication methods used
Essential Eight guidance
The Essential Eight Maturity Model requires that all MFA used is either:
- something users have and something users know, or
- something users have that is unlocked by something users know or are.
Applicability to online services is determined by the following table:
System/Service | Who | That process, store or communicate | ML1 | ML2 | ML3 |
---|---|---|---|---|---|
Third-party Online Services: | Users | Sensitive or Non-sensitive Data: | Any | Phishing Resistant Only | Phishing Resistant Only |
Organisation’s Online Services: | Users | Sensitive Data: | Any | Phishing Resistant Only | Phishing Resistant Only |
Third-party Online Customer Services: | Users | Sensitive Customer Data: | Any | Phishing Resistant Only | Phishing Resistant Only |
Organisation’s Online Customer Services: | Users | Sensitive Customer Data: | Any | Phishing Resistant Only | Phishing Resistant Only |
Online Customer Services: | Customers | Sensitive Customer Data: | Any | Phishing Resistant Option | Phishing Resistant Only |
Applicability to other systems and services is determined by the following table:
System/Service | Who | ML1 | ML2 | ML3 |
---|---|---|---|---|
Systems: | Privileged Users: | - | Phishing Resistant Only | Phishing Resistant Only |
Unprivileged Users: | - | Phishing Resistant Only | Phishing Resistant Only | |
Data Repositories: | Privileged Users: | - | - | Phishing Resistant Only |
Unprivileged Users: | - | - | Phishing Resistant Only | |
Blueprint guidance
The use of Microsoft services constitutes user access to online services per the above table, which at Maturity Level two and three requires phishing-resistant multifactor authentication to be used. For consideration of options for authentication factors, see Blueprint Design: Authentication, noting that use of the Microsoft Authenticator application meets a maximum of Maturity Level Three.
Similarly, authentication to Windows endpoints constitutes access to other systems, and should similarly require phishing resistant multifactor authentication as described above.
Microsoft Entra ID is configured as the central store for identity and access management within <SYSTEM-NAME>
, acting as central management for user authentication and authorisation to various Single Sign On (SSO) services, including as for access to <SYSTEM-NAME>
Windows endpoints.
Microsoft Entra ID is configured to utilise the following authentication methods:
User group | Authentication method | Notes |
---|---|---|
Unprivileged users: | <Authentication method-1> | |
<Authentication method-2> | ||
Privileged users: | <Authentication method-1> | |
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Logging
Essential Eight guidance
Maturity Levels 2 and 3 require that
- all successful and unsuccessful MFA events to be captured from all systems and services and centrally logged
- event logs are protected from unauthorised modification and deletion.
The collection of event logs for monitoring of <SYSTEM-NAME>
is performed in accordance with <ORGANISATION-NAME>
’s Event Logging Policy, and includes the aggregation of the following logs into Microsoft Log Analytics:
MFA Event (Microsoft 365 services) | Forwarded to Log Analytics |
---|---|
Successful MFA: | <YES> |
Unsuccessful MFA: | <YES> |
MFA Event (Workstations) | Forwarded to Log Analytics |
---|---|
Successful MFA: | <YES> |
Unsuccessful MFA: | <YES> |
MFA Event (<Internet-facing servers> ) | Forwarded to Log Analytics |
---|---|
Successful MFA: | <YES> |
Unsuccessful MFA: | <YES> |
MFA Event (<Non-internet-facing servers> ) | Forwarded to Log Analytics |
---|---|
Successful MFA: | <YES> |
Unsuccessful MFA: | <YES> |
MFA Event (<OTHER-SERVICE-1> ) | Forwarded to Log Analytics |
---|---|
Successful MFA: | <YES> |
Unsuccessful MFA: | <YES> |
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Monitoring and response
Essential Eight guidance
Maturity Levels 2 and 3 require all successful and unsuccessful MFA event logs from the following systems to be analysed in a timely manner to detect cyber security events:
System | ML2 | ML3 |
---|---|---|
Internet-facing servers: | Yes | Yes |
Non-internet-facing servers: | - | Yes |
Workstations: | - | Yes |
Both Maturity Levels 2 and 3 also require the following:
- cyber security events are analysed in a timely manner to identify cyber security incidents
- as soon as possible after a cyber security incident occurs or is discovered the:
- cyber security incident response plan is enacted.
- incident is reported to the CISO, or one of their delegates
- incident is reported to ASD.
Blueprint guidance
The Blueprint provides limited guidance to support organisations in developing an approach for the response to cyber security incidents. However, the section below is provided for organisations to describe the measures implemented within their system.
Effective implementation of these controls is generally built on a combination of system-specific and whole of organisation processes, and may include the coordination of a number of teams and staff across an organisation.
<SYSTEM-NAME>
utilises the Microsoft 365 Defender portal and <SIEM-PRODUCT>
to assist in the identification of cyber security incidents.
This includes the processing, analysis, and response to the following event logs in a timely manner:
MFA Event | Microsoft 365 Services | Workstations | <INTERNET-FACING-SERVERS> | <NON-INTERNET-FACING-SERVERS> | <OTHER SERVICES> |
---|---|---|---|---|---|
Successful MFA: | <YES> | <YES> | <IMPLEMENTATION> | <IMPLEMENTATION> | <IMPLEMENTATION> |
Unsuccessful MFA: | <YES> | <YES> | <IMPLEMENTATION> | <IMPLEMENTATION> | <IMPLEMENTATION> |
<ORGANISATION-NAME>
has established a Security Operations Centre (SOC) to analyse cyber security events in a timely manner, a Cyber Security Incident Register and Incident Response Plan to facilitate the response to detected cyber security events in a timely and appropriate manner. This plan includes reporting all incidents to the <ORGANISATION-NAME>
CISO and to ASD in a timely manner.
<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>
Related information
Security & Governance
Design
- Authentication
- Conditional Access
- Identity Monitoring and Auditing
- Platform Monitoring and Auditing
- Security Information and Event Monitoring
Configuration
External links
- ASD’s Essential Eight
- Microsoft’s Service Trust Portal
- Microsoft’s Guidance for meeting ASD’s Essential Eight - Multi-Factor Authentication