πŸ” MFA

Multi-Factor Authentication That’s Phishing-Resistant, Adaptive & Auditable

Multi-Factor Authentication (MFA) proves a user is who they say they are by requiring two or more factorsβ€”something you are (biometric), have (hardware key or device), or know (secret). SolveForce designs MFA to be phishing-resistant, adaptive to risk, and easy to use, with complete evidence for audits. It plugs into your identity fabric (SSO/IAM), device trust, and Zero-Trust access.

Identity fabric references:
πŸ”‘ IAM β†’ IAM / SSO / MFA β€’ πŸ”“ SSO β†’ SSO β€’ πŸ›‘οΈ ZTNA/SASE β†’ ZTNA β€’ SASE
πŸ–₯️ Device trust β†’ MDM / UEM β€’ πŸ›‘οΈ EDR/XDR β†’ EDR / MDR / XDR
πŸ”‘ Key trust β†’ PKI β€’ Key Management / HSM β€’ πŸ§ͺ Evidence β†’ SIEM / SOAR


🎯 Outcomes (Why MFA, Done Right)

  • Phishing-resistant authentication (WebAuthn/FIDO2, platform/hardware passkeys).
  • Adaptive friction β€” strong when risk is high, nearly invisible when risk is low.
  • Least-privilege enforcement β€” step-up MFA for sensitive actions and admin elevation.
  • Audit-ready evidence β€” who/what/where/when/why (policy ID, risk, device).
  • User acceptance β€” fast, consistent prompts; clear fallback with minimal lockouts.

🧱 MFA Building Blocks (Spelled Out)

  • Factors (prefer in this order):
    1) WebAuthn/FIDO2 (hardware key or device passkey; phishing-resistant)
    2) Push with number-matching (anti-fatigue)
    3) TOTP (authenticator app codes)
    4) SMS/Voice fallback only (riskier; rate-limited, geo/ASN-aware)
  • Policy Engine (in your IdP/IAM): conditional access by user, role, device posture, location/ASN, app sensitivity, and session risk.
  • Enrollment & Lifecycle: first-use verification, two registered factors minimum, recovery options, secure revocation on device loss.
  • Logging & Analytics: full decision trail to SIEM/SOAR for correlation, anomaly detection, and audit packs.

See the broader program β†’ IAM / SSO / MFA


πŸ”’ Phishing-Resistant MFA (Your New Default)

  • WebAuthn/FIDO2 (passkeys) β€” cryptographic challenge/response bound to the origin; blocks credential replay and MFA phishing kits.
  • Device binding & attestation β€” tie keys to managed devices; validate attestation where supported.
  • mTLS & token binding (advanced) β€” bind sessions to device keys for high-risk workflows.
    β†’ Keys & certificates: PKI β€’ Key Management / HSM

🧠 Adaptive MFA (Identity β†’ Device β†’ App β†’ Data β†’ Context)

MFA should trigger when risk warrants:

1) Identity β€” user, group/role, assurance level. β†’ IAM / SSO / MFA
2) Device Posture β€” EDR/UEM health, OS version, disk encryption. β†’ MDM / UEM β€’ EDR / MDR / XDR
3) Application Sensitivity β€” finance/admin consoles vs. general SaaS.
4) Data Classification β€” PII/PHI/PAN actions require step-up; watermark read-only sessions. β†’ DLP
5) Context β€” geo/ASN anomalies, impossible travel, TOR/VPN signals, session age.

Outcomes: allow β†’ step-up (phish-resistant) β†’ isolate (read-only/RBI) β†’ deny.
Admin elevation routes through PAM with session recording. β†’ PAM


πŸ” Where MFA Prompts (and Where It Shouldn’t)

  • Login β€” always enforce MFA for privileged roles and external/BYOD access.
  • Step-up β€” on sensitive operations: wire transfers, key vault access, policy edits, break-glass.
  • Session refresh β€” on risk spikes (new ASN/geo, posture drift), not arbitrarily every N minutes.
  • Silent periods β€” low-risk SaaS with strong posture can avoid repeated prompts via signed device assertions.

🧯 Enrollment, Recovery & Break-Glass (No Lockouts)

  • Enrollment β€” require two phish-resistant factors (e.g., hardware key + platform passkey).
  • Recovery β€” recovery codes stored offline, help-desk verified recovery with identity proofing; immediate revocation of lost factors.
  • Break-glass β€” time-boxed, hardware-token-only path for critical roles; all actions logged and reviewed.
  • De-provision β€” revoke tokens/sessions within <60 s when users leave. (Track in IAM JML.) β†’ IAM / SSO / MFA

πŸ›‘οΈ Security Hardening (Practical Controls)

  • Push fatigue defenses β€” number-matching, rate limits, lockout after repeats.
  • SIM-swap resistance β€” avoid SMS where possible; geo/ASN checks; velocity detection.
  • Code integrity β€” 6–8 digit TOTP, 30-second windows, limited drift; no email codes.
  • Device attestation β€” prefer hardware-backed keys; block rooted/jailbroken devices.
  • Session hygiene β€” short token TTLs for high-risk apps; re-auth on privilege change.
  • Evidence streaming β€” all MFA events to SIEM/SOAR with dashboards and alerts. β†’ SIEM / SOAR

πŸ“ SLO Guardrails (Experience You Can Measure)

MetricTarget (Regional)Notes
Login β†’ token (SSO)≀ 1–2 s typicalWith cached metadata; local IdP PoP
MFA step-up (WebAuthn/push)≀ 3–5 sPrefer WebAuthn; number-match on push
Provisioning propagation (SCIM)< 5 minFor adds/role changes
De-provision revoke< 60 sCritical for terminations/compromises
MFA success rateβ‰₯ 98–99%Track per factor, per region

Test with IdP synthetics and real-user monitoring for top apps. β†’ NOC Services


🧭 Migration Plan (From OTP-Only to Phish-Resistant MFA)

  1. Inventory users/apps; classify risk; identify admin/finance/PHI apps.
  2. Choose factors β€” FIDO2 as primary; push/TOTP as secondary; SMS only as fallback.
  3. Enroll in rings β€” IT/admins β†’ finance/HR β†’ all users; require two factors minimum.
  4. Step-up policies β€” add action-based prompts for sensitive operations.
  5. Device trust β€” enforce EDR/UEM posture checks for managed devices. β†’ MDM / UEM β€’ EDR / MDR / XDR
  6. Decommission legacy email codes/SMS-only; keep break-glass tokens.
  7. Evidence β€” stream logs, build SLO dashboards, publish weekly adoption metrics. β†’ SIEM / SOAR

πŸ“Š Metrics That Matter

  • MFA adoption by factor (FIDO2, push, TOTP, SMS).
  • Prompt rate per user per week (keep low in low-risk contexts).
  • Failure & fallback rates (watch SMS spikes).
  • Fraud blocks β€” push fatigue rejections, impossible travel stops.
  • De-provision lag β€” time from HR event to session kill.

Report to security and compliance leadership monthly; tie to risk register.


🧾 Compliance Mapping (Examples)

  • PCI DSS 8 β€” MFA for admin and remote access to CDE.
  • ISO 27001 / SOC 2 β€” logical access control with MFA + audit trails.
  • HIPAA β€” unique user identification, emergency access, audit controls; MFA strengthens authentication.
  • NIST SP 800-63-3 β€” AAL2/AAL3 guidance (FIDO2 keys meet higher assurance when deployed correctly).
  • CMMC β€” IA/AC domains (MFA for privileged and remote access).

All evidence streams to SIEM/SOAR, linked to incidents and audits. β†’ SIEM / SOAR


🧰 Integrations & Runbooks

  • IdP/SSO β€” SAML/OIDC federation; adaptive policies; SCIM provisioning. β†’ SSO β€’ IAM / SSO / MFA
  • ZTNA/SASE β€” per-app access with posture + MFA; unify logs. β†’ ZTNA β€’ SASE
  • Helpdesk β€” secure recovery playbooks; identity proofing steps; approvals logged. β†’ Helpdesk Support
  • PAM β€” step-up for admin elevation; record sessions. β†’ PAM

βœ… Pre-Engagement Checklist

  • πŸ‘₯ Users/roles; contractors/partners; BYOD posture.
  • πŸ” Factor policy: primary (FIDO2), secondary (push/TOTP), fallback (SMS minimal).
  • πŸ–₯️ Device requirements: EDR/UEM, OS versions, disk encryption.
  • 🧭 App risk tiers; step-up actions (finance, key vaults, policy edits).
  • 🧾 Evidence: SIEM dashboards, audit cadence, weekly adoption reports.
  • πŸ”„ Break-glass tokens & recovery procedures; time-boxed; review after use.

πŸ”„ Where MFA Fits (Recursive View)

1) Grammar β€” identity traffic rides Connectivity
2) Syntax β€” login flows & app delivery in Cloud
3) Semantics β€” truth of identity & device via Cybersecurity
4) Pragmatics β€” SolveForce AI predicts risk and reduces prompts
5) Foundation β€” consistent terms enforced by Primacy of Language
6) Map β€” indexed in SolveForce Codex & Knowledge Hub


πŸ“ž Design MFA Users (and Auditors) Will Love

Related pages:
IAM / SSO / MFA β€’ SSO β€’ ZTNA β€’ SASE β€’ MDM / UEM β€’ EDR / MDR / XDR β€’ PAM β€’ DLP β€’ PKI β€’ Key Management / HSM β€’ SIEM / SOAR β€’ Cybersecurity β€’ Knowledge Hub