Skip to content
IT Leader Company Logo
  • Services

    Overview

    Find every technology solution your organisation needs under one roof – with simplified, per-user pricing for all managed services.

    Learn More
    • IT Support
    • Managed Backup Solutions
    • Managed Firewall
    • Cloud
    • Cloud Migration
    • MS 365 Solutions
    • MS 365 Signature Management
    • MS 365 Migrations
    • Cyber Security
    • Cyber Security Audit
    • Cyber Awareness Training
    • Email Security
    • Endpoint Security
    • Essential Eight
    • UC / Voice
    • PBX
    • MS 365 Teams
    • Internet
    • NBN
    • IT Consulting
  • Industries

    Overview

    IT isn’t one-size-fits-all. Learn how our industry-specific expertise can help deliver the right outcomes for your organisation.

    Learn More
    • Manufacturing
    • Professional Services
    • Transportation
  • Resources
    • Blog
    • Knowledge Centre
  • About
    • About Us
    • Technical Capability Summary
    • Careers
  • Support
    • Support Options
    • Remote Support
    • New User Form
    • Exit User Form
  • Get In Touch
Get In Touch

Home - Cyber Security - Implementing Essential Eight: Multi-Factor Authentication (ML1)

Implementing Essential Eight: Multi-Factor Authentication (ML1)

  • Last Updated: 8 May 2026
ITL Logo Icon

Written By

IT Leaders

duncan-profile-image

Written By

Duncan Croker

Loading...
Loading...
lorelle-tonna-headshot_0003_IOnlineITLeadersHeadshots-17

Reviewed By

Stephen Burgess

Table of contents

Table of contents

Multi-factor authentication is a lynchpin of strong cyber security. It’s also required to reach Essential Eight Maturity Level 1, the government-recommended standard for SMBs.

If you’re working with your IT provider to get to Maturity Level 1, this guide will explain everything you need to know about multi-factor authentication – including hardening tips like Token Protection.

This article is part of a series on implementing the Essential Eight to Maturity Level 1. Read other articles in the series here.

What Is Multi-Factor Authentication?

Multi-factor authentication (MFA) is exactly what it sounds like. When you try to log into an app or another service that has MFA, you’ll need to supply at least 2 proofs of identity to succeed. Proofs of identity can include:

  • something you know (such as a PIN or secret question)
  • something you have (such as a passkey or digital token)
  • something you are (such as a fingerprint or facial scan).

MFA, which was previously known as ‘two-factor authentication’ or ‘2FA’, was developed to protect users from password theft. Without it, an adversary could steal your username and password to an application (say, Microsoft 365) and log in from anywhere in the world. MFA acts as a critical second check that prevents a lot of unsophisticated attacks.

Keep in mind that multi-factor authentication isn’t a silver bullet. There are still ways it can be defeated – for example, token theft – which is why good implementations are hardened via Conditional Access policies and Token Protection.

Implementing Multi-Factor Authentication

Controls:

  • Multi-factor authentication is used to authenticate users to their organisation’s online services that process, store or communicate their organisation’s sensitive data.
  • Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation’s sensitive data.
  • Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation’s non-sensitive data.
  • Multi-factor authentication is used to authenticate users to their organisation’s online customer services that process, store or communicate their organisation’s sensitive customer data.
  • Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation’s sensitive customer data.
  • Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data.

Because of multi-factor authentication’s effectiveness, it’s required for almost all online applications under the Essential Eight. In most cases, it isn’t hard to set up. Whenever you roll out a new online service that might have access to sensitive data – a CRM, project management software, Microsoft 365 – MFA should be enabled at the point of user account creation.

If a service doesn’t support MFA, you’ll need to talk to your IT provider about a compensating control. (It’s also worth asking yourself why a service doesn’t have MFA. Given MFA’s ubiquity in modern cyber security, its absence probably means there are bigger, more structural security concerns with the service in question.)

‘Sensitive customer data’ isn’t defined in the Essential Eight. Instead, the Australian Signals Directorate encourages reviewing the OAIC’s guidance on sensitive data under the Privacy Act 1988 (Cth). That ambiguity means it’s a good idea to err on the side of caution – if your customers would react badly to its publication, it’s probably worth protecting with MFA.

Like most things in cyber security, though, multi-factor authentication is necessary but not sufficient. Certain kinds of attacks, like adversary-in-the-middle attacks, can breach it. Your MFA implementation should always be hardened – complemented by additional controls that make it much, much more resilient. I cover 2 of the most effective (geo-blocking and token protection) below.

Geo-Blocking

Should someone be allowed to access your Microsoft 365 tenancy from anywhere in the world? China? Russia? Iran? Even if they have the right credentials, the answer is probably ‘no’. Microsoft Entra’s Conditional Access policies let you put conditions in place around when and where people can log in – and from what devices.

One of the most effective Conditional Access policies involves blocking access based on location. If your staff only work in Queensland, for example, there’s no reason someone in Singapore would need to access your 365 tenancy. Even if they manage to compromise one of your staff accounts, they’ll be blocked from accessing any resources.

Token Protection

When you log into an online service, you’ll generate something called a ‘session token’. This is a bit like getting a wristband at an event. You’ve shown the service your ‘ticket’ (your login credentials), then the service has given you a ‘wristband’ (the token) so you can come and go for a certain amount of time without needing to log in again.

Adversaries, though, can steal your tokens to access your account themselves. Exactly how that process works is complicated – see here for a detailed breakdown – but the important takeaway is that it can’t be prevented by standard MFA. Instead, you’ll need to invest in something called ‘Token Protection’.

Token Protection is a Conditional Access policy that can be set up through Microsoft Entra. It essentially generates tokens that are ‘bound’ to individual devices that are managed via Entra. That means only logins from the device in question will work. Even if an adversary steals the token, they can’t use it. (Think of a bit like a wristband that has your face printed on it – it only works when you’re wearing it.)

Token Protection does have some limitations – for example, it can only be used with native apps, not web apps – so it should be paired with other Conditional Access policies like disabling persistent browser sessions for maximum effectiveness.

Acceptable MFA Implementations

Control:

  • Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.

The Essential Eight doesn’t view all multi-factor authentication methods as equal, and for good reason. Certain kinds, such as push notifications, are discouraged because they’re vulnerable to fatigue-based attacks (spamming users with notifications until they accidentally accept). Others, like biometrics and Trust Signals, are disallowed for technical reasons.

The simplest kind of acceptable multi-factor authentication is a one-time password or number matching via a phone-based authenticator app like Microsoft Authenticator. If the authenticator app requires a password or PIN to access, it will meet the requirements for ‘have’ (the app itself) and ‘know’ (the password/PIN).

With that said: authenticator apps aren’t considered phishing-resistant. They’re still vulnerable to token theft. A better implementation is to use Windows Hello for Business, which uses a technology called FIDO2 to authenticate logins cryptographically. To comply with Maturity Level 1, set up Windows Hello to only allows PINs or security keys and require a TPM chip (a physical piece of hardware in a device that stores cryptographic keys and other security information).

If Windows Hello isn’t an option, hardware authenticators like YubiKeys are secured with a PIN (‘know’) and must be physically pressed (‘have’) to permit a sign-in. Like Windows Hello for Business, they’re considered phishing-resistant – more than sufficient to meet Maturity Level 1.

Need help reaching Essential Eight Maturity Level 1? We help Australian SMBs strengthen their security postures – without affecting business productivity.

Book a free 60-minute consultation

More Essential Eight Implementation Guides

Read other articles in our series on reaching Essential Eight Maturity Level 1.

  • Strategy 1: Patch Applications

Written by

Loading...

Written by

duncan-profile-image
duncan-profile-image

Duncan Croker

Content Strategist

Linkedin

Duncan Croker specialises in taking technical products and services to market. He has covered the IT space since 2021, focusing on cyber security and Teams telephony.

Linkedin

Reviewed by

Loading...
lorelle-tonna-headshot_0003_IOnlineITLeadersHeadshots-17
lorelle-tonna-headshot_0003_IOnlineITLeadersHeadshots-17

Stephen Burgess

Technical Project Lead

Linkedin

Stephen Burgess is IT Leaders’ chief problem-solver. He specialises in untangling complex challenges in client environments.

View profile
Linkedin

Related Articles

View All Posts
Loading...
Managed Services
Managed Service Provider Gold Coast - IT Leaders

Our Guide To Choosing The Best Managed Service Provider For Your Business

How Secure Is Your Data? Tips To Select The Right MSP For Your Organisation A key component of enhancing your...
Cyber Security
Protecting Data to avoid Data Breaches - Top Tips for Staff Cybersecurity Training

Insider attacks: the real cost – and how to prevent them

A Major Threat To Your Business's Security Could Be On Your Payroll... You may not realise it, but you might...
Cloud
Cloud Storage Trends of 2022 - cloud computing solutions for your business

The Latest Cloud Storage Trends to Watch in 2022

Top Cloud Storage Solutions To Help Your Business One area of cloud computing that is widely used, but often isn’t...

Make the Switch

Talk to us to find out how changing IT providers could give your business the competitive edge it needs.
IT Leader Company Logo
  • service@itleaders.com.au
  • 1300 596 560
  • 07 5628 3260
  • 3/42 Lawrence Drive, Nerang QLD 4211
  • 8:30 am to 5 pm AEST, Monday to Friday
Linkedin-in Facebook-f

Services

  • Managed IT Services
  • Cloud Solutions and Infrastructure
  • Cyber Security and Compliance
  • Unified Communications and VoIP
  • Business Internet and Network Services
  • IT Consulting and Digital Transformation

Industries

  • Manufacturing
  • Professional Services
  • Transportation

Our Company

  • About Us
  • Technical Capability Summary
  • Careers
  • Contact Us

Resources

  • Blog
  • Knowledge Centre

Support

  • Remote Support
  • New User Form
  • Exit User Form
  • Support Options
  • © 2026 IT Leaders
  • Privacy Policy
  • Terms of Service
  • Terms of Use