14.3
IG1 IG2 IG3

Train Workforce Members on Authentication Best Practices

Asset Type: N/A
Security Function: Protect

Description

Train workforce members on authentication best practices. Example topics include MFA, password composition, and credential management.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Develop or procure training content
7
Define training audience and completion requirements
8
Deploy training and track completion rates
9
Measure training effectiveness through testing/simulation
10
Identify systems requiring multi-factor authentication
11
Select and deploy MFA solution
12
Enroll users and distribute authentication factors
13
Test MFA across all identified systems
14
Define password complexity and length requirements
15
Implement credential management solution
16
Configure password policy enforcement in identity provider

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Credential Stuffing Attack Using Reused Passwords

Confidentiality

An attacker uses credentials leaked from a third-party breach to access enterprise accounts because employees were never trained on password uniqueness and the dangers of credential reuse across services.

MFA Bypass Through Social Engineering of Untrained User

Confidentiality

An attacker tricks an employee into approving a fraudulent MFA push notification because the employee was never trained on how MFA fatigue attacks work or how to recognize unauthorized authentication requests.

Weak Password Compromise via Brute Force

Confidentiality

An attacker successfully brute-forces an employee account using common password patterns because the workforce has not been educated on creating strong, unique passphrases or using credential managers.

Vulnerabilities (When Safeguard Absent)

Poor Password Hygiene Across Workforce

Without authentication best practices training, employees commonly reuse passwords, choose weak credentials, and store passwords insecurely, dramatically increasing the attack surface for credential-based attacks.

Misunderstanding of MFA Mechanisms

Employees who have not been trained on MFA best practices may share one-time codes, approve unsolicited push notifications, or fail to report suspicious authentication attempts.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Training completion records and compliance rates Tracked continuously, reported quarterly
Document Training content and curriculum documentation Reviewed annually
Technical MFA enrollment status and enforcement configuration Reviewed monthly
Document Governing policy document (current, approved, communicated) Reviewed annually