Do you require multifactor authentication for all administrative accounts in your environment?
Explanation
Example Responses
Example Response 1
Yes, our organization requires multifactor authentication for all administrative accounts across our datacenter environment We implement this using a combination of password authentication plus a second factor through our enterprise identity provider (Okta) Administrative users must provide their password and either respond to a push notification on their registered mobile device or use a FIDO2 hardware security key This requirement applies to all privileged accounts including system administrators, network administrators, database administrators, and security personnel We enforce this technically through our IAM system, which prevents authentication without the second factor, and we audit compliance monthly We have no exceptions to this policy.
Example Response 2
Yes, we require MFA for all administrative accounts in our datacenter environment Our implementation uses Microsoft Azure AD for identity management with conditional access policies that enforce MFA for all privileged role assignments Administrators must use their password plus either the Microsoft Authenticator app or a company-issued YubiKey hardware token For emergency break-glass accounts, we have a strictly controlled process where two authorized individuals must be physically present to access a secured location containing the credentials and hardware token All authentication attempts are logged and monitored in real-time through our SIEM solution, with automated alerts for any suspicious access patterns.
Example Response 3
No, we currently do not require multifactor authentication for all administrative accounts in our datacenter environment While we have implemented MFA for approximately 70% of our administrative users, we have legacy systems that don't support modern authentication protocols For these systems, we implement compensating controls including IP restrictions, jump servers with enhanced monitoring, privileged access management (PAM) solutions that require checkout procedures, and shorter session timeouts We recognize this as a security gap and have a documented roadmap to migrate all remaining systems to MFA-compatible solutions within the next 6 months, with interim risk acceptance documented and approved by our CISO.
Context
- Tab
- Infrastructure
- Category
- Datacenter

