Multi-factor authentication for privileged users of systems
Ensure privileged users use more than just a password to access systems.
Plain language
This control ensures that users with special access rights, like IT staff, use more than just a password to access important systems. It's like adding a second lock to your front door; even if a thief copies your key (or password), they won't get in without the second key. Without it, hackers could easily take over systems and steal sensitive information.
Framework
ASD Essential Eight
Control effect
Preventative
E8 mitigation strategy
Multi-factor authentication
Classifications
N/A
Official last update
N/A
Control Stack last updated
19 Mar 2026
E8 maturity levels
ML2
Official control statement
Multi-factor authentication is used to authenticate privileged users of systems.
Why it matters
Without MFA, attackers can hijack privileged accounts, potentially leading to full system control and catastrophic data breaches.
Operational notes
Review MFA sign-in logs for privileged accounts, alert on failed prompts, and ensure all new admin accounts are enrolled in MFA immediately.
Implementation tips
- IT team should enable multi-factor authentication for all privileged accounts by configuring it in the system settings and training users on its use.
- System administrator should regularly review privileged accounts to ensure multi-factor authentication is consistently applied by checking system logs for compliance.
- Security officer should choose strong authentication methods like security tokens or mobile authenticator apps, implementing them through a vendor-provided solution.
- IT support should be available to assist users in setting up multi-factor authentication on their devices, providing clear step-by-step instructions and support contacts.
- Management should communicate the importance of multi-factor authentication to all privileged users, explaining its role in protecting organisational data and encouraging compliance.
Audit / evidence tips
-
AskHow is multi-factor authentication implemented for privileged users?
-
GoodDocumentation shows multifactor setup for privileged users and technical settings confirm compliance
-
AskAre there logs that show multi-factor authentication usage for privileged users?
-
GoodLogs clearly indicate that multi-factor authentication is used extensively by all privileged users
Cross-framework mappings
How E8-MF-ML2.1 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (1) expand_less | ||
| Annex A 8.5 | E8-MF-ML2.1 requires MFA for privileged users accessing systems | |
| sync_alt Partially overlaps (1) expand_less | ||
| Annex A 5.17 | Annex A 5.17 addresses establishing a management process for allocating and protecting authentication information and advising personnel ... | |
| handshake Supports (1) expand_less | ||
| Annex A 8.2 | E8-MF-ML2.1 requires MFA to authenticate privileged users of systems | |
ASD ISM
| Control | Notes | Details |
|---|---|---|
| handshake Supports (5) expand_less | ||
| ISM-0553 | ISM-0553 requires authentication and authorisation for all actions on a video conferencing network, including call setup and changing set... | |
| ISM-1620 | ISM-1620 requires privileged accounts to use the AD Protected Users group, which helps prevent use of weaker authentication methods and r... | |
| ISM-1816 | ISM-1816 requires preventing unauthorised modification of the authoritative software source | |
| ISM-1919 | ISM-1919 requires disabling authentication protocols that do not support MFA whenever MFA is used, reducing the risk privileged users can... | |
| ISM-1927 | ISM-1927 requires that access to key Microsoft identity servers is limited to privileged users who require access | |
| link Related (1) expand_less | ||
| ISM-1173 | E8-MF-ML2.1 requires multi-factor authentication (MFA) to be used to authenticate privileged users of systems | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.