Comparative analysis for Multi-Factor Authentication techniques
Today we are doing a comparative analysis for three Multi-Factor Authentication (MFA) methods: Mobile Authenticator Apps, Text/Call-based MFA, and FIDO Keys. The aim is to understand the risk associated with these three methods but not just the risk, I will also touch on reliability and cost. Its worth noting that there are a number of MFA options. For example, in Entra ID, there are different authentication options. Hello for Business, Passkey, certificate-based authentication, Microsoft Authentication, temporary access passes, and password plus voice.
In recent days there have been quite a few cases of hackers bypassing MFA. Well that is because each method has its own strengths and vulnerabilities in terms of usability, security, and resilience against attacks.
Although having some MFA mechanism is better than having no MFA. As seen below, not all MFA methods are created equal nor do they provide the same security. Phishing Resistant MFA is a thing, and it is becoming more and more important as the techniques of hackers, scammers and bad actors are getting more sophisticated.
1. MFA methods overview
Mobile Authenticator App (e.g., Authenticator App):
Text/Call-Based MFA:
FIDO Keys (e.g., YubiKey):
2. Risk Analysis and Comparison
Recommended by LinkedIn
Summary of Key Findings
Security:
Usability:
Cost and Scalability:
4. Recommendations
Each of these MFA methods serves a purpose, and in many cases, a combination of them can help your diverse security, cost, and user experience needs.
Ultimately, the Authenticator apps provide the best of both worlds for general use, I would, however, recommend that privileged users use FIDO keys or something that is more resilient against Phishing and MitM attacks, for example MFA with Number matching, USB dongles or Smart Cards.
Very informative. Thanks for sharing Christheo v.R