Well-Architected Framework
Protect user accounts with strong authentication methods
Implementing strong authentication methods is essential to protect your systems and data. Strong authentication methods help ensure that only authorized users can access your systems, reducing the risk of unauthorized access and potential security breaches.
What are strong authentication methods
Strong authentication methods involve a combination of techniques and technologies to verify a user's identity before granting access to systems. Strong authentication methods typically consist of the following:
- Something you know: such as a password or passphrase.
- Something you have: such as a hardware token or smart card.
- Something you are: such as a fingerprint or facial recognition.
Strong authentication methods include:
- Multi-factor authentication (MFA): Combination of one or more sign-in factors to verify a user's identity.
- Biometric authentication: Use of unique biological traits, such as fingerprints or facial recognition, to verify a user's identity.
- Adaptive authentication: Contextual authentication that adjusts the level of verification based on user behavior and risk factors.
Why implement strong authentication methods
Writing policies that follow least privilege ensures that an authorized user does not have access to systems or data they should not have access to. It does not, however, ensure that unauthorized users have not improperly gained access to credentials that allow authentication to those systems or data.
When you implement strong authentication methods, you add another layer of security by validating the identity of users before granting access. When you combine strong authentication methods with centralized identity management, you have an authentication model that ensures authorized users have access to systems.
HashiCorp tools and services like the HashiCorp Cloud Platform, Vault, and HCP Terraform support both centralized identity management and strong authentication methods using multi-factor authentication. Other tools like Nomad and Boundary support multi-factor authentication through integration with third party identity providers like Okta.
HashiCorp Consul service mesh allows you to securely connect services across multiple runtime platforms. Consul supports mutual Transport Layer Security (mTLS) authentication, which provides strong service-to-service authentication within the service mesh.
HashiCorp resources:
- Multi-factor authentication with HCP
- Enable multi-factor authentication in Vault
- Configure two-factor authentication in HCP Terraform
External resources:
Next steps
Following these documents in order ensures a logical progression through the key concepts and best practices, helping you build a strong foundation to build your identity and access management program.
- Define access requirements
- Grant least privilege
- Create permissions and guardrails
- Centralize identity management
- Implement strong authentication methods (this document)
- Use dynamic credentials
- Manage access lifecycle
In this section of Identity and access management you learned why you should use strong authentication methods in conjunction with centralized identity management and policies that follow the principle of least privilege. Identity and access management is part of the Secure systems pillar.