The Australian Cyber Security Centre (ACSC) recommends implementing multi-factor authentication (MFA) as it’s “one of the most effective controls an organization can implement to prevent an adversary from gaining access to device or network and accessing sensitive information.”
Including MFA maybe part of your Zero Trust journey but what additional factors have you considered? Where is the user authenticating from? Is that authentication outside of the user’s normal login times? What is the hygiene of the device from which they are connecting from? Is it patched and up to date or worse has a known indicator of compromise been detected on the device by an endpoint agent? These are just some of the questions we need to ask when implementing a secure access solution that goes beyond MFA.
Join this webinar to hear more and learn about:
- ACSC’s maturity model for MFA
- Duo’s role in the Essential 8
- How Duo assists with Zero Trust
- VPN-less with Duo