Skip to content
Control Stack logo Control Stack
E8-MF-ML2.1 ASD Essential Eight

Multi-factor authentication for privileged users of systems

Ensure privileged users use more than just a password to access systems.

🏛️ Framework

ASD Essential Eight

🧭 Control effect

Preventative

🛠️ E8 mitigation strategy

Multi-factor authentication

🔐 Classifications

N/A

🗓️ Official last update

N/A

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

ML2

Official control statement
Multi-factor authentication is used to authenticate privileged users of systems.

Source: ASD Essential Eight

Plain language

This control ensures that users with special access rights, like IT staff, use more than just a password to access important systems. It's like adding a second lock to your front door; even if a thief copies your key (or password), they won't get in without the second key. Without it, hackers could easily take over systems and steal sensitive information.

Why it matters

Without MFA, attackers can hijack privileged accounts, potentially leading to full system control and catastrophic data breaches.

Operational notes

Review MFA sign-in logs for privileged accounts, alert on failed prompts, and ensure all new admin accounts are enrolled in MFA immediately.

Implementation tips

  • IT team should enable multi-factor authentication for all privileged accounts by configuring it in the system settings and training users on its use.
  • System administrator should regularly review privileged accounts to ensure multi-factor authentication is consistently applied by checking system logs for compliance.
  • Security officer should choose strong authentication methods like security tokens or mobile authenticator apps, implementing them through a vendor-provided solution.
  • IT support should be available to assist users in setting up multi-factor authentication on their devices, providing clear step-by-step instructions and support contacts.
  • Management should communicate the importance of multi-factor authentication to all privileged users, explaining its role in protecting organisational data and encouraging compliance.

Audit / evidence tips

  • Ask: How is multi-factor authentication implemented for privileged users?

  • Good: Documentation shows multifactor setup for privileged users and technical settings confirm compliance

  • Ask: Are there logs that show multi-factor authentication usage for privileged users?

  • Good: Logs clearly indicate that multi-factor authentication is used extensively by all privileged users

Cross-framework mappings

How E8-MF-ML2.1 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (2)
Annex A 8.2 E8-MF-ML2.1 mandates MFA for privileged users of systems to mitigate credential compromise risks
Annex A 8.5 E8-MF-ML2.1 requires MFA to authenticate privileged users of systems
Partially overlaps (1)
Annex A 5.17 Annex A 5.17 addresses establishing a management process for allocating and protecting authentication information and advising personnel ...

ASD ISM

Control Notes Details
Supports (5)
ISM-0553 ISM-0553 requires authentication and authorisation for all actions on a video conferencing network, including call setup and changing set...
ISM-1620 ISM-1620 requires privileged accounts to use the AD Protected Users group, which helps prevent use of weaker authentication methods and r...
ISM-1816 ISM-1816 requires preventing unauthorised modification of the authoritative software source
ISM-1919 ISM-1919 requires disabling authentication protocols that do not support MFA whenever MFA is used, reducing the risk privileged users can...
ISM-1927 ISM-1927 requires that access to key Microsoft identity servers is limited to privileged users who require access
Related (1)
ISM-1173 E8-MF-ML2.1 requires multi-factor authentication (MFA) to be used to authenticate privileged users of systems

Mapping detail

Mapping

Direction

Controls