Identity & Authentication

User authentication and identity protection controls

7controls
2critical
2auto-remediable
ID-01CriticalLevel 1

User MFA Registration

MFA blocks over 99.9% of account compromise attacks. Even with a CA policy requiring MFA, users must actually register MFA methods to be protected. Low registration means users are vulnerable.

ID-02HighLevel 1Auto-fix

Block Legacy Authentication

Legacy protocols like IMAP and POP3 cannot enforce MFA. Attackers specifically target these protocols to bypass your MFA policies. Blocking them closes a major attack vector.

ID-03MediumLevel 1

Enable Self-Service Password Reset

SSPR allows users to securely reset passwords without helpdesk intervention. It reduces password reset tickets by up to 70% while maintaining security through MFA verification during reset.

ID-05HighLevel 1

Configure Smart Lockout Protection

Password spray attacks try common passwords across many accounts. Smart lockout detects these patterns and blocks attackers while allowing legitimate users to authenticate. Weak settings leave you vulnerable.

ID-06HighLevel 1

Complete Authentication Methods Policy Migration

The legacy per-user MFA system cannot be centrally managed or monitored. Migrating to the unified Authentication Methods policy enables centralized control over passkeys, FIDO2, and all MFA methods.

ID-07MediumLevel 2

Passkey Adoption Coverage

Passkeys provide phishing-resistant authentication for all users. High adoption rates reduce organizational vulnerability to credential theft attacks. Microsoft and industry standards increasingly recommend passkeys as the primary authentication method.

ID-04CriticalLevel 3Auto-fix

Require Phishing-Resistant MFA for All Users

Phishing attacks can bypass traditional MFA. At Level 3, the entire organization uses authentication methods that cryptographically prove user presence, eliminating MFA bypass attacks entirely.

Ready to implement identity & authentication controls?

TrueConfig continuously monitors your Microsoft 365 tenant and helps you maintain compliance with these security controls.