{"id":1230,"date":"2019-11-13T11:23:05","date_gmt":"2019-11-13T16:23:05","guid":{"rendered":"https:\/\/ndisac.org\/dev\/dibscc\/?p=1230"},"modified":"2025-05-16T13:23:28","modified_gmt":"2025-05-16T18:23:28","slug":"multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/","title":{"rendered":"Multi-Factor Authentication"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]Multifactor authentication (MFA) to an information system, as described by The DoD, uses two or more methods of authentication involving something you know (e.g., password); something you have (e.g., a One-Time Password (OTP) generating device like a fob, smart-card, or a mobile app on a smart-phone); and something you are (e.g., a biometric like a fingerprint or iris). The traditional authentication method uses a single factor, typically a password, while multifactor authentication requires that a second factor also be used such as PIN sent via a text message (using something you have \u2013 the cell phone) or something you are (fingerprint). <a href=\"https:\/\/dodprocurementtoolbox.com\/faqs\/cybersecurity\/cybersecurity-faqs\" target=\"_blank\" rel=\"noopener noreferrer\">(Source)<\/a><br \/>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;]\n\t\t\t<div class='et-tabs-container et_sliderfx_fade et_sliderauto_false et_sliderauto_speed_5000 et_slidertype_top_tabs'>\n\t\t\t\t<p>\n\t\t<ul class='et-tabs-control'>\n\t\t\t<li><a href='#'>\n\t\t\tStandards\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tImplementation \/ Use Cases\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tIndustry Best Practices\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tExample Tools \/ Policies\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tCMMC Readiness\n\t\t<\/a><\/li>\n\t\t<\/ul> <!-- .et-tabs-control -->\n\n\t\t<div class='et-tabs-content'>\n\t\t\t<div class='et-tabs-content-main-wrap'>\n\t\t\t\t<div class='et-tabs-content-wrapper'>\n\t\t\t\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat623 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/csrc.nist.gov\/csrc\/media\/Presentations\/2022\/multi-factor-authentication-and-sp-800-63-digital\/images-media\/Federal_Cybersecurity_and_Privacy_Forum_15Feb2022_NIST_Update_Multi-Factor_Authentication_and_SP800-63_Digital_Identity_%20Guidelines.pdf\" id=\"link-12392\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST &#8211; Multi-Factor Authentication and SP 800-63 Digital Identity Guidelines<\/a>\n<p>This slide presentation identifies Multi-factor Authentication background information and NIST directives.<\/p><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_0\/home?element=IA-2\" id=\"link-3220\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53: IA-2 Identification and Authentication (Organization Users)<\/a>\n<p>Control objectives for the implementation of multi-factor authentication from NIST SP 800-53.<\/p><\/li>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-63-4.pdf\" id=\"link-2536\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-63: Digital Identity Guidelines<\/a>\n<p>This NIST Special Publication covers identity proofing and authentication of users interacting with government IT systems over open networks.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat624 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.brighttalk.com\/webcast\/19773\/640779?q=multifactor\" id=\"link-2710\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">BrightTALK &#8211; Cybersecurity Roundtable: MFA Bypass and How to Defend Against It<\/a>\n<p>This video consists of a panel of cybersecurity experts discussing advanced MFA bypass techniques and examining how their clients have enhanced their cybersecurity posture to respond.<\/p><\/li>\n<li><a href=\"https:\/\/www.brighttalk.com\/webcast\/2037\/622501?utm_source=brighttalk-portal&#038;utm_medium=web&#038;utm_content=Multi-Factor%20Authentication&#038;utm_term=search-result-4&#038;utm_campaign=webcasts-search-results-feed\" id=\"link-14635\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">BrightTALK &#8211; FIDO Deployment Challenges &amp; Best Practices for FIDO Key Management<\/a>\n<p>Webinar presented by Thales and Verasec on challenges and best practices for deploying and managing FIDO (phishing-resistant MFA).<\/p><\/li>\n<li><a href=\"https:\/\/nordlayer.com\/blog\/mfa-for-remote-access\/\" id=\"link-2736\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NordLayer &#8211; The importance of multi-factor authentication for remote access<\/a>\n<p>This blog post describes why multifactor authentication (MFA) is important for remote access.<\/p><\/li>\n<li><a href=\"https:\/\/www.yumpu.com\/en\/document\/read\/45916565\/symantec-white-paper-two-factor-authentication-tc-trustcenter\" id=\"link-2718\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Symantec Whitepaper &#8211; Two-Factor Authentication<\/a>\n<p>This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat625 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/MFA\" id=\"link-14638\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; More than a password<\/a>\n<p>CISA's guide for getting started with MFA in your business and personal life.<\/p><\/li>\n<li><a href=\"https:\/\/help.duo.com\/s\/article\/7769?language=en_US\" id=\"link-14644\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Duo &#8211; Best practices for securing a Duo MFA enrollment Rollout<\/a>\n<p>This guide aims to aid existing and new Duo customers in securing their MFA rollout at their respective organizations.<\/p><\/li>\n<li><a href=\"https:\/\/duo.com\/resources\/ebooks\/two-factor-authentication-evaluation-guide\" id=\"link-2716\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Duo &#8211; Two-Factor Authentication Evaluation Guide<\/a>\n<p>Learn what to look for when assessing and comparing two-factor authentication solutions.<\/p><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/identity\/ad-fs\/operations\/configure-additional-authentication-methods-for-ad-fs\" id=\"link-14642\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft &#8211; Authentication Methods for AD FS<\/a>\n<p>Guide to enable Multi-factor autheitication for Active Directory Federation Services (AD FS) in Windows Server. Also provide guides for use of common Third-party authentication methods (i.e., Duo, Akamai, RSA, etc.,)<\/p><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/admin\/security-and-compliance\/set-up-multi-factor-authentication?view=o365-worldwide\" id=\"link-14640\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft &#8211; Set up Multi-Factor Authentication for M365<\/a>\n<p>Guide for enforcing MFA for Microsoft 365<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat626 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/duo.com\/product\/multi-factor-authentication-mfa\" id=\"link-2726\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Duo Multi-Factor Authentication<\/a>\n<p>Duo's wide variety of authentication methods make it easy for every user to securely and quickly log in.<\/p><\/li>\n<li><a href=\"https:\/\/www.gartner.com\/reviews\/market\/user-authentication\" id=\"link-14650\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Gartner &#8211; User Authentication Product Reviews and Ratings<\/a>\n<p>Gartner's user authentication product reviews and ratings<\/p><\/li>\n<li><a href=\"https:\/\/www.rcdevs.com\/products\/openotp\/\" id=\"link-14648\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">RCDevs<\/a>\n<p>OpenOTP is a phishing-resistant MFA solution.<\/p><\/li>\n<li><a href=\"https:\/\/www.rsa.com\/products\/securid\/\" id=\"link-2722\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">RSA SecurID Access<\/a>\n<p>Secure access to your extended enterprise with RSA SecurID Access, the leading multi-factor authentication and identity assurance solution.<\/p><\/li>\n<li><a href=\"https:\/\/cpl.thalesgroup.com\/\" id=\"link-2720\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Thales<\/a>\n<p>Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.<\/p><\/li>\n<li><a href=\"https:\/\/www.yubico.com\/\" id=\"link-14646\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Yubico<\/a>\n<p>Yubikey is a phishing-resistant MFA that stops modern cyber-attacks.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\tCMMC Related Controls<\/p>\n<ul>\n<li>Level 2 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-3\/\">IA.L2-3.5.3 \u2013 Multifactor Authentication: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.<\/a><\/li>\n<\/ul>\n<p>CMMC Assessment Guides<\/p>\n<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat671 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\" id=\"link-9988\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 1 Self-Assessment Guide<\/a>\n<p>This document provides self-assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\" id=\"link-9989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 2 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL3v2.pdf\" id=\"link-14791\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 3 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 3.<\/p>\n<\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span><\/p>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div> <!-- .et-tabs-container -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1860,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[24],"tags":[],"class_list":["post-1230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-top-10-high-value-controls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Multi-Factor Authentication - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multi-Factor Authentication - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-13T16:23:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T18:23:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"834\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\",\"name\":\"Multi-Factor Authentication - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg\",\"datePublished\":\"2019-11-13T16:23:05+00:00\",\"dateModified\":\"2025-05-16T18:23:28+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#primaryimage\",\"url\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg\",\"contentUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg\",\"width\":1000,\"height\":834},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Multi-Factor Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multi-Factor Authentication - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Multi-Factor Authentication - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2019-11-13T16:23:05+00:00","article_modified_time":"2025-05-16T18:23:28+00:00","og_image":[{"width":1000,"height":834,"url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg","type":"image\/jpeg"}],"author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/","url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/","name":"Multi-Factor Authentication - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg","datePublished":"2019-11-13T16:23:05+00:00","dateModified":"2025-05-16T18:23:28+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#primaryimage","url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg","contentUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg","width":1000,"height":834},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/multi-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Multi-Factor Authentication"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"landscape":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"portraits":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"thumbnail":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-150x150.jpg",150,150,true],"medium":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-300x250.jpg",300,250,true],"large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"1536x1536":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"2048x2048":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"et-pb-post-main-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-400x250.jpg",400,250,true],"et-pb-post-main-image-fullwidth":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-1000x675.jpg",1000,675,true],"et-pb-portfolio-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-400x284.jpg",400,284,true],"et-pb-portfolio-module-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-510x382.jpg",510,382,true],"et-pb-portfolio-image-single":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"et-pb-gallery-module-image-portrait":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-400x516.jpg",400,516,true],"et-pb-post-main-image-fullwidth-large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",1000,834,false],"et-pb-image--responsive--desktop":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",863,720,false],"et-pb-image--responsive--tablet":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-980x817.jpg",661,551,true],"et-pb-image--responsive--phone":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1-480x400.jpg",324,270,true],"gform-image-choice-sm":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",300,250,false],"gform-image-choice-md":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",400,334,false],"gform-image-choice-lg":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/226093332-1230-1.jpg",600,500,false]},"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":" <a href=\"https:\/\/ndisac.org\/dibscc\/category\/implementation-and-assessment\/top-10-high-value-controls\/\" rel=\"tag\">Top 10 High Value Controls<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1230"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=1230"}],"version-history":[{"count":36,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1230\/revisions"}],"predecessor-version":[{"id":16677,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1230\/revisions\/16677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media\/1860"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=1230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=1230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=1230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}