https://www.sans.org/white-papers/36087/
This SANS whitepaper discusses the theory behind user-based two-factor (or multifactor) authentication systems, also known as “2FA”.
https://www.sans.org/white-papers/33093/
This SANS whitepaper focuses on enterprise solutions for two-factor authentication.
https://www.sans.org/white-papers/32899/
This SANS whitepaper discusses vendor-supplied passwords that are embedded in software/hardware.
https://www.schneier.com/blog/archives/2005/04/more_on_twofact.html
More on Two-Factor Authentication and it's ineffectivenss defense against identity theft.
https://oit.alabama.gov/wp-content/uploads/2022/07/Policy_678_System_Maintenance.pdf
This example policy from the State of Alabama provides a starting point for system maintenance.
http://symantec.postclickmarketing.com/Global/FileLib/White_Papers/Whitepaper_TFA_A_TCO_Viewpoint_(1000_users).pdf
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-4
This is an example of an identification and authentication policy for Texas A&M
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-6
This example policy describes how information resources shall obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
https://cpl.thalesgroup.com/
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
http://www.cs.tufts.edu/comp/116/archive/fall2015/agoldschmidt.pdf
This document provides a study of a unique class of attack and several methods attempting to prevent attacks of a kind.