Multi-factor Authentication (PDF)

This publication provides guidance on the implementation of multi-factor authentication for high risk activities such as remote access to systems, performing privileged actions on systems and accessing important data repositories. The use of multi-factor authentication is one of the eight essential mitigation strategies from theStrategies to Mitigate Cyber Security Incidents.