Skip to content

Commit

Permalink
Merge pull request #278 from supertokens/updates-mfa-benefits
Browse files Browse the repository at this point in the history
updates what is mfa blog
  • Loading branch information
jscyo authored Sep 2, 2024
2 parents ae68e2e + 887e924 commit 8e7d681
Show file tree
Hide file tree
Showing 2 changed files with 92 additions and 34 deletions.
126 changes: 92 additions & 34 deletions content/benefits-of-multi-factor-authentication/index.md
Original file line number Diff line number Diff line change
@@ -1,17 +1,38 @@
---
title: The Multifaceted Benefits of Multi-Factor Authentication
date: "2024-01-10"
title: 10 Benefits of Multi-Factor Authentication (MFA)
date: "2024-08-05"
description: "Traditional login mechanisms are plagued by security vulnerabilities and are susceptible to attacks. Multi-factor authentication bolsters security and mitigates a number of these vulnerabilities and has now become an industry standard."
cover: "benefits-of-multi-factor-authentication.png"
category: "programming"
author: "Michiel Mulders"
author: "Mostafa Ibrahim"
---


## Table of Contents

1. [What Is Multi-Factor Authentication (MFA)?](#what-is-multi-factor-authentication-mfa)
2. [Types of Multi-Factor Authentication](#types-of-multi-factor-authentication)
3. [10 Benefits of Multi-Factor Authentication](#10-benefits-of-multi-factor-authentication)
4. [Problems With Traditional Security Mechanisms and How MFA Solves Them](#problems-with-traditional-security-mechanisms-and-how-mfa-solves-them)
5. [Designing Multi-Factor Authentication Without Sacrificing Good UX](#designing-multi-factor-authentication-without-sacrificing-good-ux)
6. [Real-world Use Cases of Multi-Factor Authentication](#real-world-use-cases-of-multi-factor-authentication)
7. [The Future of Secure Access: What to Expect for MFA?](#the-future-of-secure-access-what-to-expect-for-mfa)
8. [Getting Started with MFA in 2024](#getting-started-with-mfa-in-2024)
9. [Conclusion](#conclusion)


In 2022, over [80% of data breaches](https://www.verizon.com/business/en-gb/resources/2022-data-breach-investigations-report-dbir.pdf) were attributed to compromised passwords.

Although email-password based authentication has become the de facto method for authentication, it is very vulnerable to attacks. Through phishing, keylogging or simple brute-force attacks, traditional authentication mechanisms can be exploited to gain access to a users account. This is why modern platforms like Google, Amazon and Netflix have moved towards MFA or multi-factor authentication.

## What Is Multi-Factor Authentication (MFA)?

Multi-Factor Authentication is a security mechanism that requires users to provide two or more verification factors to gain access to a resource such as an application, online account, or VPN. Unlike traditional password-based systems, MFA adds extra layers of security, significantly reducing the risk of unauthorized access.

![mfa flow](./mfa-flow.png)

### Types of Multi-Factor authentication

With Multi-factor authentication, the user would have to prove their identity through multiple forms of identification. The basic idea is that adding challenges to the authentication flow exponentially increases the difficulty of the account being compromised.

These additional forms of authentication can be based of the following types:
Expand All @@ -22,64 +43,101 @@ These additional forms of authentication can be based of the following types:

The implementation of additional factors is a tradeoff between security and user experience. While not always true, higher security leads to a more cumbersome user experience. We’ll evaluate the security and UX tradeoffs associated with different authentication factors

## Problems With Traditional Security Mechanisms and How MFA Solves Them
### Common MFA methods include:

According to the Verizon data breach investigation report of 2022, “There’s been an almost 30% increase in stolen credentials since 2017, cementing it as one of the most tried-and-true methods to gain access to an organization for the past four years.”
1. **SMS or email-based one-time passwords (OTP)**: The system sends a unique code via text message or email. While convenient, this method is vulnerable to interception.
2. **Authenticator apps generating time-based one-time passwords (TOTP)**: These apps generate short-lived codes on the user's device. They're more secure than SMS but require the user to have a compatible device.
3. **Hardware tokens**: Physical devices that generate codes or use cryptographic techniques. They're highly secure but can be inconvenient and costly to implement.
4. **Biometric authentication**: Uses physical characteristics like fingerprints, facial features, or voice patterns. It's user-friendly and difficult to forge, but implementation can be expensive.
5. **Push notifications to registered devices**: The system sends a notification to a pre-registered device, which the user must approve. This method is user-friendly and secure, but relies on the user having access to their registered device.

Further, exploiting vulnerability attributes for almost 20% of methods to access an organization. And finally, brute force attacks still contributed to more than 10% of all attacks.
## 10 Benefits of Multi-Factor Authentication

Once a hacker obtains a user’s login credentials, they can access sensitive information which they can abuse to get more information about the user, often leading to financial losses and reputational damage.
### 1. Enhanced Security

For instance, thousands of high-profile YouTube accounts got hacked in 2019-2020 through session hijacking and using privilege escalation to change account owners. That is why protecting sensitive actions like "changing account ownership" behind secondary factors is important. This common strategy used by many applications can reduce the fallout of a compromised account.
The primary benefit of MFA is the significant improvement in security it offers. By requiring multiple forms of verification, MFA creates a multi-layered defense that is much more difficult for unauthorized users to breach. Even if an attacker manages to obtain one factor (such as a password), they would still need to overcome additional barriers to gain access.

Let’s explore the different types of second factors in multi-factor authentication.
### 2. Reduced Risk of Unauthorized Access

## Types of Second Factors in Multi-Factor Authentication
MFA significantly mitigates the risk of unauthorized access, even if credentials are compromised. According to a report by Microsoft, implementing MFA can block 99.9% of automated attacks on accounts. This statistic demonstrates the powerful impact MFA has on preventing account takeovers, making it an essential tool in modern cybersecurity strategies.

### 3. Protection Against Phishing Attacks

- SMS and Email Passcodes
- Time - Based One - Time Passcodes (TOTP):
- Biometric authentication
- FIDO (Fast Identity Online) Authentication
MFA provides robust protection against phishing attacks, one of the most common cyber threats. Even if a user accidentally reveals their password to a phishing site, the additional authentication factors required by MFA can prevent attackers from gaining access to the account. This added layer of security is crucial in an era where phishing attempts are becoming increasingly sophisticated.

### 4. Customizable Security Policies

MFA offers organizations the flexibility to tailor security measures based on various factors such as user roles, location, or data sensitivity. This customization allows for a balanced approach to security, where high-risk activities or sensitive data access can be protected with additional or more robust authentication factors, while routine access remains user-friendly. For instance, a company might require biometric verification for financial transactions but only a push notification for accessing general company announcements, ensuring security without sacrificing convenience.

### 1. SMS and Email passcodes
### 5. Enhanced User Trust and Confidence

SMS and email passcodes are familiar and easy choices for users. However, they do have their drawbacks.
In an era where data breaches are frequently in the news, implementing MFA can significantly boost user trust. Customers and employees alike appreciate knowing that their sensitive information is protected by more than just a password. This increased confidence can lead to improved customer loyalty and employee satisfaction.

**Pros**: Mobile phones are everywhere, and SMS is a widely recognized communication method. Additionally, email clients can be used on various devices, making both of these methods highly accessible.
### 6. Ease of Integration and Usability

**Cons:** SMS passcodes have a high risk of being intercepted. SIM card hacking software is cheap. You can buy such software for [30-50 dollars](https://hackcontrol.org/blog/sms-two-factor-authentication-dangerous/). A hacker can use this software if they are in close proximity to your mobile phone. The software will create a false cellular station to intercept SMS messages to restore access to your account.
Modern MFA solutions are designed with user experience in mind. Many can be seamlessly integrated into existing systems and applications, providing enhanced security without sacrificing usability. With options like biometric authentication and push notifications, MFA can often be more convenient than traditional password-only systems.

Besides, users are vulnerable to SIM swap attacks in which social engineering convinces the mobile operator to carry over the phone number to a new SIM card. In August 2023, Bart Stephens, cofounder of crypto fund Blockchain Capital, lost $6.3 million of Bitcoin due to a SIM swap attack. An anonymous hacker seized control over Stephens’s cellular network account and then ported Stephens’s number to a new SIM to gain access to his crypto account.
### 7. Cost-Effectiveness

Additionally, emails are also subject to latency and email deliverability can also have issues.
While implementing MFA does require some investment, it is often far less costly than dealing with the aftermath of a security breach. The potential savings in terms of prevented data loss, regulatory fines, and reputational damage make MFA a cost-effective security measure in the long run. Interestingly, a study by IBM found that the average cost of a data breach in 2024 was $5.17 million, while the cost of implementing MFA is typically a fraction of this amount, often less than $50 per user annually.

### 2. Time-Based One-Time Passwords (TOTP):
### 8. Future-Proof Security

With TOTP, an authenticator application uses a shared secret key generated by the authentication server to create a one-time password that changes at a very short interval.
As cyber threats continue to evolve, MFA provides a flexible framework that can adapt to new security challenges. Many MFA systems can be updated to incorporate new authentication methods as they become available, ensuring that security measures remain effective against emerging threats.

**Pros:** Codes are being generated dynamically every 30 seconds. This limited time window makes it harder for hackers to steal your codes. When a new code is created, the previous code is invalidated.
### 9. Reduced Impact of Password Fatigue

**Cons:** Although TOTP solves the downsides associated with email/SMS passcodes, if the authentication server’s database is breached and the secret key is compromised, the attacker could generate codes and gain access to the user’s account. Additionally, an attacker can intercept the code you send to the server and use it to gain unsolicited access to your account.
MFA can alleviate some of the pressure associated with creating and remembering complex passwords for multiple accounts. While strong passwords remain important, the additional factors in MFA mean that security doesn't rely solely on password strength, potentially reducing password fatigue among users.

### 3. Biometric authentication
### 10. Improved Access Management

Using unique biometric markers like fingerprint, voice, or face to authenticate the user.
MFA systems often come with robust access management features, allowing organizations to have granular control over user permissions. This enables better monitoring of access attempts, easier management of user accounts, and the ability to quickly revoke access when needed.

**Pros:** Biometrical authentication provides the most organic experience since the user does not need to remember credentials or enter an OTP.
## Problems With Traditional Security Mechanisms and How MFA Solves Them

**Cons:** Hardware for biometrical authentication is expensive.
According to the Verizon data breach investigation report of 2022, “There’s been an almost 30% increase in stolen credentials since 2017, cementing it as one of the most tried-and-true methods to gain access to an organization for the past four years.”

### FIDO (Fast Identity Online) Authentication
Further, exploiting vulnerability attributes for almost 20% of methods to access an organization. And finally, brute force attacks still contributed to more than 10% of all attacks.

FIDO, which stands for Fast Identity Online, is not a specific authentication method but rather an open authentication standard. Its primary objective is to unify secure login factors such as biometrics and passkeys under a common standard. When employing FIDO, you require a physical device like a Yubikey. A Yubikey generates cryptographic secrets to complete the authorization process.
Once a hacker obtains a user’s login credentials, they can access sensitive information which they can abuse to get more information about the user, often leading to financial losses and reputational damage.

For instance, thousands of high-profile YouTube accounts got hacked in 2019-2020 through session hijacking and using privilege escalation to change account owners. That is why protecting sensitive actions like "changing account ownership" behind secondary factors is important. This common strategy used by many applications can reduce the fallout of a compromised account.

Traditional security mechanisms, primarily relying on username and password combinations, have several inherent weaknesses:

- **Single Point of Failure:** If a password is compromised, the entire account becomes vulnerable. MFA mitigates this risk by requiring additional factors, making it much harder for attackers to gain unauthorized access even if they obtain the password.
- **Password Reuse:** Users often reuse passwords across multiple accounts, amplifying the impact of a single breach. MFA helps contain the damage from password reuse, as the additional factors are typically unique to each service.
- **Weak Passwords:** Despite guidelines, many users still choose easily guessable passwords. Attackers exploit this using dictionary attacks and advanced hardware for brute-force attempts. MFA provides a strong defense against these methods, as the additional factors are not susceptible to such attacks.
- **Phishing Vulnerability:** Traditional systems are susceptible to phishing attacks that trick users into revealing their credentials. MFA, especially when using hardware keys or biometrics, offers robust protection against phishing. Even if a user falls for a phishing attempt, the attacker won't have the additional factors needed to access the account.
- **Lack of User Verification:** Password-only systems cannot verify if the person entering the correct credentials is actually the authorized user. MFA addresses this by incorporating factors that are inherently tied to the user, such as biometrics or possession-based factors like a smartphone or hardware key.

### MFA addresses these issues by adding additional layers of security and verification:

**Pros:** It is hard to compromise because an attacker needs access to your physical device to retrieve the token. Furthermore, FIDO devices often incorporate local authentication methods like fingerprint recognition, which is not vulnerable to phishing attacks.
- **Biometric Factors:** Fingerprints, facial recognition, or iris scans provide a highly secure and user-friendly authentication method. These are extremely difficult to spoof, especially when combined with other factors.
- **Hardware Keys:** USB or NFC-based security keys offer a physical factor that must be present for authentication. These are highly resistant to remote attacks and phishing attempts.
- **Time-based One-Time Passwords (TOTP):** Apps like Google Authenticator generate temporary codes that change every 30 seconds, adding a dynamic layer of security.
- **Push Notifications:** Services can send authentication requests directly to a user's registered device, allowing for quick and secure approval of login attempts.

**Cons:** One drawback is registering your physical device with each service. Additionally, FIDO is still an emerging standard and has yet to be universally adopted. Therefore, when FIDO is not supported, you may still need to resort to different authentication methods.
### It's important to note that while MFA significantly enhances security, it's not a silver bullet. Good cybersecurity practices remain crucial:

- Using password managers to generate and store strong, unique passwords for each account.
- Staying vigilant about clicking links and checking domain names before entering credentials or performing sensitive actions.
- Keeping software and systems updated to protect against known vulnerabilities.
- Educating users about current threats and best practices for online security.

## Designing Multi-Factor Authentication Without Sacrificing Good UX

While security is paramount, it's crucial to implement MFA in a way that doesn't negatively impact user experience. Here are some strategies to achieve this balance:

- **Offer Multiple MFA Options:** Provide users with choices such as SMS, email, authenticator apps, or biometrics.
- **Implement Risk-Based Authentication:** Only trigger additional authentication factors when suspicious activity is detected.
- **Use Seamless Authentication Methods:** Leverage technologies like push notifications or biometrics that require minimal user interaction.
- **Provide Clear Instructions:** Ensure users understand how to set up and use MFA features.
- **Optimize for Mobile:** Design MFA processes that work smoothly on mobile devices.
- **Allow Remember Device Options:** Give users the ability to mark trusted devices to reduce the frequency of MFA prompts.
- **Implement Single Sign-On (SSO):** Combine MFA with SSO to reduce the number of times users need to authenticate.

By focusing on these aspects, organizations can implement robust MFA systems that enhance security without frustrating users.


## Real-world Use Cases of Multi-Factor Authentication
Expand All @@ -90,7 +148,6 @@ Integrating MFA with SAML adds an extra layer of security. When employees access

The same is true for [Lightweight Directory Access Protocol (LDAP)](https://supertokens.com/blog/what-is-ldap). Many organizations use LDAP to store and manage user access to different systems. Integrating MFA with LDAP means that when users try to access a system, they must provide additional authentication like an SMS or email passcode. Integrating LDAP with MFA is particularly useful in large organizations with complex access control requirements.


## The Future of Secure Access: What to Expect for MFA?

It’s almost certain that multi-factor authentication (MFA) will grow in popularity. Here’s what you can expect for MFA in the future:
Expand All @@ -106,7 +163,8 @@ One downside of MFA is the friction it can add to the authentication experience.

In short, the future of MFA is expected to be more integrated with a strong focus on context and biometrics.

## Getting Started with MFA in 2023
## Getting Started with MFA in 2024

[SuperTokens MFA](https://supertokens.com/docs/mfa/introduction) offering supports a number of auth factors like email/sms based OTP or TOTP as an auth factor.

It also supports the following features:
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 8e7d681

Please sign in to comment.