https://www.sans.org/white-papers/36087/
This SANS whitepaper discusses the theory behind user-based two-factor (or multifactor) authentication systems, also known as “2FA”.
https://www.sans.org/white-papers/33093/
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
https://www.schneier.com/blog/archives/2005/04/more_on_twofact.html
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
https://oit.alabama.gov/wp-content/uploads/2022/07/Policy_678_System_Maintenance.pdf
This example policy from the State of Alabama provides a starting point for system maintenance.
https://www.stigviewer.com/stig/network_device_management_security_requirements_guide/
This Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the NIST 800-53 and related documents.
http://symantec.postclickmarketing.com/Global/FileLib/White_Papers/Whitepaper_TFA_A_TCO_Viewpoint_(1000_users).pdf
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-4
This is an example of an identification and authentication policy for Texas A&M
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-6
This example policy describes how information resources shall obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
Texas A&M Policy: Identification and Authentication (Non-Organizational Users) (IA-8)
3.5 3.5.1 Identification and Authentication
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-8
This example policy describes the configuration of resources to uniquely identify and authenticate users not affiliated with the university who are permitted to utilize university information resources.
Texas A&M Policy: Identification and Authentication (Organizational Users) (IA-2)
3.5 3.5.1 Identification and Authentication
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-2
This example policy describes the capability for information resources to uniquely identify and authenticate university faculty, staff, students, and other approved users.