User Permissions and Two Factor Authentication

A robust security infrastructure is based on user permissions and two-factor authentication. They help reduce the risk of accidental or malicious insider activity, reduce the impact of data breaches, and ensure compliance with regulations.

Two-factor authentication (2FA) requires users to enter credentials from two different categories in order to log into an account. This could be something that the user is familiar with (passwords, PIN codes and security questions) or something they own (one-time verification code that is sent to their phone, or an authenticator application) or something they have (fingerprints facial or retinal scan).

2FA is often a subset to Multi-Factor Authentication that has more than two components. MFA is a requirement in certain industries, such as healthcare banking, ecommerce, and healthcare (due to HIPAA regulations). The COVID-19 epidemic has increased the importance of security for organizations that require two-factor authentication.

Enterprises are living things and their security infrastructures are constantly evolving. Users change roles and capabilities of hardware are changing, and complex systems are now in the hands of users. It is important to regularly examine the two-factor authentication strategies regularly to ensure they keep up with these changes. One way to accomplish this is to use adaptive authentication. This is a type of contextual authentication that will trigger policies based on how the login request comes in. Duo offers a central administrator dashboard which lets you easily manage and set these types of policies.

article

You May Also Like

Avatar

About the Author: Micky Aron