Skip to main content
← All controls
AAL3 / IA-2(1) / IA-2(2) / A.9.4.2 NIST SP 800-63B

Phishing-resistant MFA for admins

Demonstrate that all administrative accounts are protected by phishing-resistant MFA methods that cannot be intercepted, replayed, or socially engineered during authentication.

Description

What this control does

Phishing-resistant multi-factor authentication (MFA) for administrative accounts requires authentication methods that cannot be compromised through social engineering, credential phishing, or session hijacking attacks. This includes hardware security keys (FIDO2/WebAuthn), platform authenticators (TPM-backed), or certificate-based authentication, explicitly excluding SMS, voice calls, push notifications, and TOTP codes which remain vulnerable to real-time phishing and adversary-in-the-middle attacks. Administrative accounts—those with elevated privileges to configure systems, access sensitive data, or manage user permissions—represent the highest-value targets and require the strongest authentication assurance.

Control objective

What auditing this proves

Demonstrate that all administrative accounts are protected by phishing-resistant MFA methods that cannot be intercepted, replayed, or socially engineered during authentication.

Associated risks

Risks this control addresses

  • Adversary-in-the-middle (AitM) attacks that intercept and replay TOTP codes or push notifications to gain administrative access
  • Credential phishing campaigns targeting administrators using fake login portals that harvest passwords and one-time codes in real-time
  • Session hijacking after administrators authenticate using non-cryptographically-bound MFA methods
  • SIM-swapping or SMS interception attacks that compromise SMS-based second factors for privileged accounts
  • Push notification fatigue attacks where attackers spam approval requests until administrators inadvertently approve malicious login attempts
  • Unauthorized privileged access by threat actors who compromise traditional MFA through social engineering helpdesk staff
  • Lateral movement and persistence by attackers who elevate privileges after bypassing weak MFA on administrative accounts

Testing procedure

How an auditor verifies this control

  1. Obtain a current inventory of all accounts with administrative, elevated, or privileged access across identity providers, cloud platforms, directory services, and management consoles.
  2. Review the organization's MFA policy documentation to identify which authentication methods are classified as phishing-resistant and approved for administrative use.
  3. Export MFA method configurations from each identity provider and authentication system, capturing the specific authenticator types registered to each administrative account.
  4. Select a representative sample of at least 20 administrative accounts spanning different systems, roles, and user populations for detailed verification.
  5. For each sampled account, verify the registered MFA methods match approved phishing-resistant types (FIDO2 security keys, platform authenticators with attestation, PKI certificates) and exclude vulnerable methods (SMS, voice, TOTP apps, push notifications).
  6. Conduct live authentication tests with at least three sampled administrators to observe the actual authentication flow and confirm hardware or platform authenticators are required and functioning.
  7. Review conditional access policies, authentication policies, and enforcement rules to confirm phishing-resistant MFA is mandated—not optional—for all administrative access paths including emergency access accounts.
  8. Examine audit logs from the past 90 days to identify any administrative authentication events using non-phishing-resistant methods and validate these represent documented exceptions with compensating controls or are false positives due to classification errors.
Evidence required Configuration exports from identity providers showing registered authenticator types per administrative account, screenshots of conditional access or authentication policies requiring phishing-resistant methods for privileged roles, and authentication log samples demonstrating FIDO2/WebAuthn or certificate-based authentication events. Policy documentation defining phishing-resistant methods and administrative account scope, evidence of live authentication testing showing hardware security key or platform authenticator usage, and exception records with approval and compensating control documentation for any administrative accounts not yet enrolled.
Pass criteria All administrative accounts across all systems use only phishing-resistant MFA methods with no exceptions lacking documented risk acceptance and compensating controls, and enforcement policies technically prevent administrative authentication using vulnerable MFA types.