You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MFA is necessary but not sufficient as an OpSec strategy. If you have not yet implemented MFA, we suggest making it your first priority as soon as you finish reading this page.
21
+
MFA is necessary but not sufficient as an OpSec strategy. If you have not yet implemented MFA, we suggest making it
22
+
your first priority as soon as you finish reading this page.
22
23
23
24
Not all MFAs are created equally. A few recommendations:
24
25
25
26
1.**Stay away from text and email as MFA methods.** There are innumerable reasons why neither of these methods
26
27
is a good idea. Suffice it to say, best practices have long since outlawed these MFA methods.
27
28
28
29
2.**TOTP (e.g., Google Authenticator) is good but not great.** Why? It is easy enough to trick users into
29
-
entering TOTP codes into a phishing site. The methods cited below are more difficult to exploit. Also, any manual typing is susceptible to keyloggers.
30
+
entering TOTP codes into a phishing site. The methods cited below are more difficult to exploit. Also, any
31
+
manual typing is susceptible to keyloggers.
30
32
31
33
3.**Push-based MFA is better.** Why? Because initiating a push notification on iOS/Android requires that the
32
34
device itself be enrolled with the identity provider. Phishing sites cannot initiate a push notification to
33
35
the Gmail app, for example, without a major compromise of Google's infrastructure.
34
36
35
37
4.**Passkeys are the best.** Biometrics are hard to fake, and in a world where attackers are looking for low
36
-
hanging fruit, passkeys protected by biometric factors are typically too hard for them to reach. However, passkey storage is critical to ensuring that this choice is secure - please read the note below.
38
+
hanging fruit, passkeys protected by biometric factors are typically too hard for them to reach. However, passkey
39
+
storage is critical to ensuring that this choice is secure - please read the note below.
37
40
38
41
5.**Key admins (e.g., your G Suite admin) should be using Yubikeys.** They are inexpensive and easy. There is
39
42
no excuse here for not protecting the keys to the castle with the industry gold standard for MFA.
40
43
41
-
Once you have MFA in place, you are ready to move on to the next step in your Opsec framework. However, before you declare your MFA journey a success, make sure you haven't forgotten any of your communication tools along the way. In this industry, we often use a combination of X, Signal, and Telegram, and each of them can and should be protected with an additional authentication factor. Also, note that the more you allow one-off sign-ins for each tool you use, the more you have to be concerned about the MFA features of each tool. Implementing single sign-on wherever possible is the best way to enforce MFA across all the tools you use.
44
+
Once you have MFA in place, you are ready to move on to the next step in your Opsec framework. However, before you
45
+
declare your MFA journey a success, make sure you haven't forgotten any of your communication tools along the way.
46
+
In this industry, we often use a combination of X, Signal, and Telegram, and each of them can and should be protected
47
+
with an additional authentication factor. Also, note that the more you allow one-off sign-ins for each tool you use,
48
+
the more you have to be concerned about the MFA features of each tool. Implementing single sign-on wherever possible
49
+
is the best way to enforce MFA across all the tools you use.
42
50
43
-
Take into consideration that, while using passkeys seems the most appropriate course of action, using them irresponsibly could lower your security posture. Passkeys only improve security when they remain tied to a strong device and recovery model; used carelessly, they can weaken it by shifting trust from a hard-to-phish login flow to softer cloud sync and account recovery paths. A common failure case is storing high-value passkeys in consumer sync ecosystems protected by weak recovery, reused credentials, SMS reset, or unmanaged devices, so an attacker who compromises the sync account can restore those passkeys on their own device and log in cleanly with what appears to be strong authentication. In that setup, the passkey itself is not broken, but the overall security posture is worse because the real attack surface becomes account recovery, device enrollment, and endpoint compromise rather than direct credential theft. A typical mistake would be to store a passkey in the Google password manager for your personal Google account, which may not be adequately protected with a strong password, MFA, and a secure account recovery method.
51
+
Take into consideration that, while using passkeys seems the most appropriate course of action, using them
52
+
irresponsibly could lower your security posture. Passkeys only improve security when they remain tied to a
53
+
strong device and recovery model; used carelessly, they can weaken it by shifting trust from a hard-to-phish login
54
+
flow to softer cloud sync and account recovery paths. A common failure case is storing high-value passkeys in consumer
55
+
sync ecosystems protected by weak recovery, reused credentials, SMS reset, or unmanaged devices, so an attacker who
56
+
compromises the sync account can restore those passkeys on their own device and log in cleanly with what appears to
57
+
be strong authentication. In that setup, the passkey itself is not broken, but the overall security posture is worse
58
+
because the real attack surface becomes account recovery, device enrollment, and endpoint compromise rather than direct
59
+
credential theft. A typical mistake would be to store a passkey in the Google password manager for your personal Google
60
+
account, which may not be adequately protected with a strong password, MFA, and a secure account recovery method.
44
61
45
-
To address the passkey storage issue, this section should be read in conjunction with the section (coming soon) about password handling and password management. Passkeys are the strongest form of MFA when stored in a secure password manager with biometric authentication (e.g., Bitwarden, 1Password). Passkeys stored in a personal account that uses phone or SMS as a recovery mechanism make overall security worse, not better. Before finalizing any decision to migrate to passkeys, please read the password management section and ensure that you are ready to store your passkeys securely.
62
+
To address the passkey storage issue, this section should be read in conjunction with the section (coming soon) about
63
+
password handling and password management. Passkeys are the strongest form of MFA when stored in a secure
64
+
password manager with biometric authentication (e.g., Bitwarden, 1Password). Passkeys stored in a personal account
65
+
that uses phone or SMS as a recovery mechanism make overall security worse, not better. Before finalizing any decision
66
+
to migrate to passkeys, please read the password management section and ensure that you are ready to store your
0 commit comments