Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

AuthN Type NumberAuthentication FactorResistance to Threat
Theft
  via Static MITM Phishing
Theft via Dynamic MITM  PhishingGuessing / Offline CrackingMFA Device
 Compromise
User Workstation Compromise
1PasswordLowLowDependsn/aLow
2Phone callLowLowHighLowHigh
3Phone call (VoIP) See noteLowLowMediumLowHigh
4SMSLowLowHighLowHigh
5SMS (VoIP) See noteLowLowMediumLowHigh
6HOTP phone softwareLowLowHighMediumHigh
7TOTP phone softwareLowLowHighMediumHigh
8HOTP tokenLowLowHighHighHigh
9TOTP tokenLowLowHighHighHigh
10HOTP written (back up codes)LowLowHighHighLow
11DUO PushHighLowHighMediumHigh
12FIDO U2F token with passwordHighHighHighHighHigh
13PKI device certificate with
  device password
HighHighHighHighMedium
14PKI token certificate wth token
  password
HighHighHighHighHigh

 Note: VOIP is distinguished from other types of phone due to it typically being protected by a single password. It may be worth distinguishing "institutional VOIP service" from "personal VOIP service". In the former case it's much more likely that the VOIP system is protected by the same password as that used for the "first factor" of authentication.

 

Table 2 - Authentication Types and Combinations of Authentication Types that meet profile requirements.

...