Essential Eight Passkeys: Phishing-Resistant MFA
1. Introduction: Essential Eight Passkeys
The 2023-2030 Australian Cyber Security Strategy underscores Australia’s commitment to strengthening its cyber defense mechanisms. Central to this strategy is the Essential Eight / Essential 8 Framework. In November 2023, significant revisions were made to the Essential Eight / Essential 8 and myGov launched passkeys in June 2024 and Hon. Bill Shorten MP announced days after the launch:
“within days of passkeys being available on myGov, over 20,000 Australians have already created a passkey for their myGov account.”
These adjustments and strong efforts of the government reflect the evolving cyber threat landscape and the necessity for more robust security measures. In this article, we will focus on the authentication aspects and answer the following questions:
2. What is the Essential Eight Framework?
The Essential Eight is a set of baseline mitigation strategies developed by the Australian Cyber Security Centre (ACSC) to help organizations strengthen their cyber defenses. Originally introduced in 2017, the Essential Eight framework was designed to provide a practical and effective foundation for mitigating cyber threats. The framework was created in response to the growing frequency and sophistication of cyberattacks, recognizing the need for a standardized approach to enhance the cyber resilience of Australian organizations.
2.1 Purpose of the Essential Eight Framework
The primary purpose of the Essential Eight is to protect systems and data from a wide range of cyber threats. It provides organizations with a clear, structured approach to implementing essential security measures. By adopting these strategies, organizations can significantly reduce the risk of cyber incidents and improve their overall security posture. The Essential Eight is applicable to all types of organizations, regardless of their size or industry, making it a versatile and comprehensive framework.
Historically, the Essential Eight has played a critical role in advancing Australia's cyber security strategy. It aligns with the broader objectives of the Australian Cyber Security Strategy, which aims to create a secure and resilient digital environment for the country. The framework is periodically reviewed and updated to address emerging threats and incorporate advancements in security technologies.
2.2 Key Mitigation Strategies of the Essential 8 Framework
The Essential Eight framework consists of eight key mitigation strategies, each addressing a specific aspect of cyber security. These strategies include:
The framework also introduces the concept of Maturity Levels, which help organizations gauge their implementation progress and set security goals based on their size and the criticality of their service. By progressing through these maturity levels, organizations can continuously enhance their security capabilities and resilience.
3. Essential Eight Maturity Levels
The Essential Eight framework introduces a maturity model to help organizations assess their current security posture and set achievable goals for improvement. This model consists of three distinct maturity levels, each representing a different stage of cyber hygiene and security measures (note that there is actually a fourth maturity level 0, but which is equal to having not maturity at all).
3.1 Overview of the Essential Eight Maturity Model
The maturity model provides a structured approach for organizations to enhance their cyber defenses progressively. Each maturity level corresponds to a set of security practices and measures appropriate for the organization's size, complexity, and the criticality of their data and services.
3.2 Essential Eight Maturity Level 0: No Cyber Hygiene
Maturity Level 0 represents organizations that have either incomplete or no cyber hygiene measures in place. These organizations are highly vulnerable to cyber threats and must begin implementing basic security practices.
3.3 Essential Eight Maturity Level 1: Basic Cyber Hygiene
Maturity Level 1 focuses on establishing foundational security practices. Organizations at this level typically have minimal cyber security measures in place and are beginning to address common threats. This level is suitable for:
3.4 Essential Eight Maturity Level 2: Enhanced Security Measures
Maturity Level 2 builds on the foundational practices established in Level 1, introducing more advanced security measures to address a broader range of threats. Organizations at this level should already have a strong understanding of cyber security and are working to enhance their defenses. This level is suitable for:
3.5 Essential Eight Maturity Level 3: Advanced Security Posture
Maturity Level 3 represents the highest level of cyber security maturity within the Essential Eight framework. Organizations at this level must implement comprehensive and advanced security measures to protect against sophisticated threats and have already started to roll out passkeys:
Understanding these maturity levels helps organizations identify their current security posture and develop a roadmap for continuous improvement, aligning with the broader goals of Australia's 2023-2030 Cyber Security Strategy.
4. Why is Multi-Factor Authentication One of the Most Important Elements of Essential Eight
Protecting authentication is one of the most important aspects of cybersecurity. Authentication is the gate to data access and failing to protect credentials is the root of many cybersecurity incidents.
4.1 What Multi-Factor Authentication Factors Exist under Essential Eight?
Multi-Factor Authentication (MFA) under the Essential Eight framework requires the use of multiple authentication methods from different authentication categories to verify the identity of users. The categories include:
The updated guidelines specify that MFA should not rely on two factors from the same category, e.g. two knowledge-based factors.
Prior to the update, security questions were often used as a secondary factor. However, this is no longer acceptable due to the increased risk of these factors being compromised. The Essential Eight now mandates the use of more secure and varied authentication methods to ensure robust protection against phishing and other cyber threats.
Factor Overview for Essential Eight MFA
The official Essential Eight Assessment Process Guide lays out more details and assessment of authentication factors:
Most current deployments use passwords as the first factor which is then combined with another factor. The table makes transparent that passkeys are the only authentication method that performs well on all characteristics.
While most characteristics do not need an explanation, the following require some background knowledge:
After we have discussed the MFA factor definitions of the Essential Eight framework and compared the most important MFA factors and their characteristics, we will now investigate how Essential Eight categorizes sensitive data.
领英推荐
4.2 What’s Data Sensitivity Under Essential Eight?
Understanding the differences of sensitive data is important because different requirements follow. The Essential Eight Framework distinguishes between sensitive organizational and sensitive customer data.
4.2.1 What’s Sensitive Organizational Data Under Essential Eight?
Sensitive organizational data pertains to information that is crucial to the operations and security of an organization. Unauthorized access or disclosure of this data can have serious implications for the organization's functioning and security posture.
Non-sensitive organizational data includes information that is not critical to the organization's security or operations and does not pose a significant risk if disclosed. This type of data is still protected, but with less stringent measures compared to sensitive data.
Around organizational data, there is low confusion about sensitivity, most of the time both data exist at the same place. Therefore, nearly all companies treat all organizational data as sensitive data, and the higher requirements are applied to authentication.
4.2.2 What’s Sensitive Customer Data Under Essential Eight?
Sensitive customer data includes personal information that, if disclosed, could cause significant harm or distress to individuals. This type of data is protected under stricter security measures due to its critical nature.
Although the Essential Eight framework does not explicitly reference non-sensitive customer data, there might be situations where services might only process uncritical data. Non-sensitive customer data would include information that, if disclosed, does not pose a significant risk to the individual’s privacy or security. The following table can act as guidance to what customer data could be classified as sensitive customer data.
Nearly all consumer-facing services that allow customers to purchase services or goods today include some sort of personal data or privacy-related information under Australian Privacy Principles (APPs). There is no clear definition of the extent to which sensitive customer data are covered.
4.3 Essential Eight MFA Requirements
We have now explained two of the three important components that determine the resulting MFA requirements:
The last important component is who is authenticated:
This structured approach ensures that the appropriate level of security is applied based on the risk and impact associated with a possible breach. Based on the associated risk, Essential Eight has three possible requirements and recommendations:
The following table shows when the Essential Eight framework requires which authentication by Maturity Level, data sensitivity and type of user.
The red table cells show that companies at Maturity Level 2 or higher must implement phishing-resistant multi-factor authentication.
4.4 Phishing-Resistant MFA is the New Standard
It is a clear commitment by the Australian Government and all its advisors to push for passkeys as a replacement for passwords. Enforcing phishing-resistance also for consumers was only made possible by the advent of passkeys (passkeys are referenced frequently on the governmental Essential 8 page).
While phishing-resistant authentication for “organizational users” / workforce can be done via workforce Single-Sign-On or Identity Providers (IdPs) like Azure AD or Google Workspace, phishing-resistant customer authentication is difficult:
Next, we will focus on how to implement phishing-resistant consumer MFA for companies and government agencies.
5. Implementing Phishing-Resistant MFA for Consumers with Passkeys
The Australian Cyber Security Strategy and Essential Eight framework require organizations to implement phishing-resistant MFA (via passkeys). Our whitepaper provides an overview and shows how to implement passkeys efficiently and what the business impact is.
Unlock the Full Potential of Essential Eight Passkeys
Steps to Implement Phishing-Resistant MFA
Measuring Implementation Success
6. Recommendation
Integrating phishing-resistant MFA, specifically through passkeys, is important for future-proofing organizational cyber security in line with the Essential Eight framework. Here are several recommendations to ensure a successful transition:
6.1 Start Early with Your Passkeys Implementation
6.2 Focus on Preparation and Riskless, Gradual Passkey Rollout
6.3 Aim for High Passkey Adoption and High Passkey Login Rates
6.4 Robust MFA Recovery Strategy
6.5 Learn from Early Adopters
By following these recommendations, organizations can not only comply with the Essential Eight requirements but also significantly enhance their overall cyber security posture. Transitioning to passkeys will position organizations to better handle emerging cyber threats, ensuring a safer and more resilient digital environment.
7. Conclusion: Essential 8 MFA with Passkeys
The Essential Eight framework, developed by the Australian Cyber Security Centre (ACSC), represents a critical component of Australia's national cyber security strategy. It aims to provide organizations with a comprehensive and structured approach to mitigating cyber threats. Through this article, we've explored the Essential Eight framework, focusing on the following key questions:
In conclusion, the Essential Eight framework offers a robust and adaptable approach to improving cyber security across organizations of all sizes. By progressing through the maturity levels, organizations can enhance their security posture and resilience against cyber threats. The shift towards phishing-resistant MFA, particularly through the adoption of passkeys, aligns with the framework's emphasis on strong authentication. As the Australian government continues to update and refine the Essential Eight, organizations should prioritize the implementation of these strategies to safeguard their systems and data effectively.