Contact salesSign inSign up

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Blog
/
Current article

Essential Eight: Understanding Phishing-Resistant MFA Updates - Authsignal

Published:
November 27, 2023
Last Updated:
October 16, 2024
Justin Soong
Essential Eight Maturity Mode updates to Multi-factor Authentication controls and strategies, in particular, the introduction of Phishing Resistant MFA

In November 2023, the Australian Signal's Directorate (ASD) updated the Essential Eight Maturity Model. We break down the key aspects of Essential Eight and explain the changes specifically relating to Multi-factor authentication.

MFA Changes Essential Eight

The summary of the changes to the Essential Eight maturity levels in relation to Multi-Factor Authentication (MFA) is as follows:

  1. Revision of MFA Standards in Maturity Level One: Initially, Maturity Level One did not specify the types of authentication factors for MFA, leading to the use of weaker forms like biometrics, security questions, or 'Trusted Signals.' These forms are not recognized as valid by standards. A new standard has been introduced at this level, requiring MFA to include 'something users have' and 'something users know,' thus enhancing security.
  2. Enforcement of MFA for Sensitive Customer Data Web Portals: Organizations must now enforce MFA for web portals storing sensitive customer data, such as personal, health, or identity-related information. This change, affecting Maturity Level One through Maturity Level Three, addresses ongoing attacks on password-only systems. It amends previous requirements that allowed customers to opt out of MFA in favor of weaker password authentication.
  3. Adoption of Phishing-Resistant MFA Options: The option for phishing-resistant MFA is now provided for customers at lower maturity levels, while its use is mandatory at higher maturity levels. This approach is a response to the rise in attacks against weaker MFA implementations and aims to enhance security across all maturity levels.
  4. Increased Emphasis on Phishing-Resistant MFA in Maturity Level Two: Maturity Level Two now requires the adoption of phishing-resistant MFA, in line with international standards like FIDO2/WebAuthn. This change addresses the vulnerability of weaker MFA methods to real-time phishing and social engineering attacks.
  5. Requirement for Phishing-Resistant MFA for Workstation Authentication: At Maturity Levels Two and Three, there is a new requirement for users to authenticate to their workstations using phishing-resistant MFA methods, such as smart cards, security keys, or Windows Hello for Business. This change aims to further bolster cybersecurity measures in the workplace.

These updates reflect a shift towards more stringent and effective MFA practices to counteract the evolving landscape of cybersecurity threats.

Changes by maturity level for MFA
Maturity Level One
  1. Multi-Factor Authentication for sensitive customer data: Eliminating the option for customers to easily bypass multi-factor authentication in online services that handle sensitive customer data.
    1. This means customers need to be enrolled and not opt out of MFA.
  2. Explicit definition Multi-Factor Authentication: Introducing a mandate for multi-factor authentication to employ either a combination of something users possess and something they know or something users possess that is activated by either something they know or an inherent characteristic they have.some text
    1. This excludes weak forms of "pseudo" MFA options like "trusted" device signals or behavioral biometrics
Authentication factors that make up a multi-factor authentication request must come from two or more of the following:
Maturity Level Two
  1. Multi-Factor Authentication for Online Customer Services: The previous option allowing customers to opt out of using MFA for online services that process, store, or communicate sensitive data has been removed. All such services must now implement MFA.
  2. MFA for Device Access by Unprivileged Users: A new requirement mandates using MFA for unprivileged users to authenticate to their devices, enhancing device-level security.
  3. Phishing-Resistant MFA for Online Services: MFA used to authenticate users of online services must now be resistant to phishing attacks.
  4. Phishing-Resistant MFA Option for Customers: Online customer services must provide a phishing-resistant MFA option for customer authentication.
  5. Phishing-Resistant MFA for System Access: MFA used to authenticate users to their systems must also be phishing-resistant.

Try Phishing-Resistant Passkeys now

Maturity Level Three
  1. Mandatory Multi-Factor Authentication for Online Customer Services: Customers can no longer bypass multi-factor authentication in online services managing sensitive data. Now, MFA is compulsory for such services.
  2. Multi-Factor Authentication for Unprivileged User Device Access: A new rule requires multi-factor authentication for unprivileged users to gain access to their devices.
  3. Expanded Multi-Factor Authentication for All Data Repositories: The implementation of multi-factor authentication has been expanded from just important data repositories to all data repositories. While this is now a universal requirement, prioritizing important data repositories is still recommended.

Australia's Financial Services Council (FSC) has also taken significant step towards protecting consumers from financial harm by releasing FSC Standard No. 29: for Superannuation Funds. This standard sets clear expectations for superannuation funds to adopt robust measures to mitigate fraud and scams, emphasizing the importance of multifactor authentication (MFA) in securing high-risk transactions. Learn more.

A welcomed advancement

The ASD's MFA pillar updates are a welcomed advancement, as they recognize the prevalence of phishing-resistant MFA factors like FIDO2/WebAuthn Passkeys.

The shift towards more deterministic measures like phishing-resistant passkeys away from probabilistic factors like trusted signals and weak forms of authentication like PINs/passwords, is also a major step change, giving clarity for anyone looking to align their security programs and postures to the Essential Eight.

Authsignal can help your organization rapidly meet Essential Eight compliance with our drop-in solutions. Please contact us or create a test account to get started.

Try out our passkey demo
Passkey Demo
Subscribe to our monthly newsletter
Subscribe
You might also like
Passkey Recovery & Fallback: Can Passkeys Stand Alone and Fully Replace Passwords & MFA?
Passkeys simplify authentication and resist phishing, but can they truly replace passwords and MFA? Explores passkey fallback opinions, key challenges, and best practices, highlighting why passkeys are the future of authentication.
Passwordless React UI Components: Add Passkeys to Your Client-Side App
Add authentication flows into your react app or website using Authsignal’s UI components with the React SDK. Fast-track passkeys and MFA implementation for your client-side app.
Synced vs Device-Bound Passkeys: How User Convenience and Authentication Experiences Vary.
Not all passkeys are the same. Synced and device-bound passkeys offer distinct benefits and trade-offs in security, access, and user experience. This guide covers the differences and key considerations for passkey recovery.
Secure your customers’ accounts today with Authsignal.