NIST SP 800-53: IA-2 Identification and Authentication (Organization Users) 3.5 3.5.3 3.7 3.7.5 Identification and Authentication Maintenance
Control objectives for the implementation of multi-factor authentication from NIST SP 800-53.
Control objectives for the implementation of multi-factor authentication from NIST SP 800-53.
This blog post describes why multifactor authentication (MFA) is important for remote access.
OpenOTP is a phishing-resistant MFA solution.
Secure access to your extended enterprise with RSA SecurID Access, the leading multi-factor authentication and identity assurance solution.
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
This example policy from the State of Georgia provides a starting point for system maintenance.
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
Yubikey is a phishing-resistant MFA that stops modern cyber-attacks.