This document is under active development and has not been finalized.
Skip to content

Authentication & MFA

Multi-Factor Authentication

MFA Requirements

Access TypeMFA RequiredPreferred Method
External access (VPN, portals)Yes -- mandatoryFIDO2 / WebAuthn
Administrative system accessYes -- mandatoryFIDO2 / TOTP
Cloud services / SaaSYes -- mandatoryTOTP / FIDO2
Email accessYes -- mandatoryTOTP / FIDO2
Internal applications (LAN)Risk-basedTOTP (if required)

MFA Methods (Ranking)

MethodSecurity LevelApplication
FIDO2 / WebAuthnHighest (phishing-resistant)Preferred for all access
TOTP (Authenticator app)HighStandard alternative
Push notificationMediumOnly with number matching
SMS OTPLow -- not permittedNot allowed (SIM swapping risk)

MFA Exceptions

Exceptions to the MFA requirement are only possible in justified cases:

  • Documented justification required
  • ISO approval mandatory
  • Compensating controls defined
  • Time-limited with scheduled review
  • Service accounts: IP allowlisting + API key instead of MFA

Password Policy

RequirementStandard
Minimum length16 characters
RecommendationPassphrase (4+ words)
ComplexityNo forced special characters (length > complexity)
Password managerMandatory for all employees
ReuseProhibited (unique password per service)
Breach checkAutomatic verification against HaveIBeenPwned / known-breach lists
ExpiryNo forced expiry (per NIST 800-63B), rotation only upon suspected compromise

Service Accounts

RequirementImplementation
No shared accountsEvery service account has a documented owner
Minimal privilegesLeast privilege, only required API scopes
RotationAPI keys rotated at least annually
MonitoringAnomaly detection for service account usage
DocumentationPurpose, owner, permissions, creation date

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT