Multi-Factor Authentication
Multi-Factor Authentication is a security method that requires users to provide two or more different forms of identity verification before they can access an account or resource. For example, in addition to entering a password, a user might also need to approve a notification on their phone or enter a code from an authenticator app. This makes it significantly harder for unauthorized individuals to gain access, even if they have stolen a password.
Multi-Factor Authentication (MFA) is an electronic authentication mechanism that requires a user to successfully present two or more independent verification factors from distinct categories, typically characterized as something the user knows (e.g., password or PIN), something the user has (e.g., a hardware token, mobile device, or smart card), and something the user is (e.g., biometric data such as a fingerprint or facial recognition). By requiring factors from separate categories, MFA reduces the likelihood that a single compromised credential will result in unauthorized access. MFA is a foundational control in identity and access management, though its effectiveness varies depending on the factor types used; for instance, SMS-based one-time codes are more susceptible to interception (e.g., SIM swapping, SS7 attacks) than hardware security keys or authenticator app-based TOTP codes. MFA does not, by itself, prevent all account compromise scenarios, such as real-time phishing proxies or session hijacking after authentication.
Why it matters
Passwords alone are insufficient to protect accounts and resources from unauthorized access. Credential theft through phishing, credential stuffing, brute-force attacks, and data breaches is one of the most common vectors for account compromise. When an attacker obtains a valid password, the only remaining barrier is whatever additional verification the system requires. Without MFA, a stolen password typically grants full access. By requiring a second or third factor from a distinct category, MFA significantly raises the difficulty of unauthorized access, even when one factor (such as a password) has been compromised.
The effectiveness of MFA depends heavily on the type of factors used. SMS-based one-time codes, while better than passwords alone, are susceptible to interception through techniques such as SIM swapping and exploitation of SS7 protocol vulnerabilities. Authenticator app-based TOTP codes and hardware security keys offer stronger protection against these specific attack vectors. However, MFA is not a complete defense against all forms of account compromise. Real-time phishing proxies, which relay authentication tokens as the user enters them, and session hijacking after successful authentication can bypass MFA under certain conditions. Organizations should therefore treat MFA as a foundational layer within a broader identity and access management strategy rather than as a standalone solution.
Despite these limitations, the absence of MFA remains a leading contributor to large-scale account breaches. Enabling MFA across user-facing and administrative accounts is widely regarded as one of the highest-impact security controls an organization can implement relative to its cost and complexity.
Who it's relevant to
Inside MFA
Common questions
Answers to the questions practitioners most commonly ask about MFA.