Decision guide · Identity and Authentication
Planning an MFA rollout: phishing-resistant authentication under NIS2 and DORA
MFA is mandatory under NIS2 Art. 21 (j) and DORA Art. 9. But MFA is not MFA: SMS OTP and email codes are no longer acceptable for privileged access in 2026. Phishing-resistant MFA with FIDO2 or Passkeys is the state of the art, especially after the AiTM proxy waves of 2023-2025.
TL;DR
Weak MFA (SMS, TOTP) is not enough in 2026. Phishing-resistant MFA is mandatory for privileged access.
Who owns this decision
CISO with IT operations and HR/change management. Data Protection in the steering group (biometrics review).
Key criteria to weight
Phishing resistance per NIST AAL3
FIDO2 / WebAuthn with hardware attestation is state of the art.
Coverage of all apps and devices
An MFA gap is an attack surface. Legacy apps need a gateway solution.
User experience and acceptance
Passkeys win because of comfort. Hardware tokens only for privileged roles.
Backup factor and lost-token process
Without recovery, MFA blocks productivity.
Integration with IAM and IGA
Factors must be differentiated by role, risk and app.
Conditional Access and risk-based MFA
Adaptive MFA reduces friction and catches anomalies.
Step-by-step decision flow
- 1
Inventory
Which apps have MFA active, which factors, which user groups. Find gaps.
- 2
Factor strategy
Per role and app: drop SMS OTP, TOTP for standard users, FIDO2/Passkeys for privileged.
- 3
Pilot with power-user group
Admins and power users with hardware keys (YubiKey, SoloKey). Lessons feed the rollout concept.
- 4
Phased rollout
Wave 1 admins, wave 2 Finance/HR/Legal, wave 3 all staff, wave 4 externals and sub-suppliers.
- 5
Memo, training, telemetry
Decision memo with stakeholder alignment. Training. Telemetry to detect MFA bypass.
Compliance note
NIS2 Art. 21 (j), DORA Art. 9, BAIT BTO 6, ISO 27002 A.8.5.
Common pitfalls
- !MFA is only enabled in Microsoft 365; other apps remain open.
- !SMS OTP is kept 'because easier'. AiTM phishing breaks it.
- !Backup factor missing. Helpdesk overwhelmed with reset requests.
- !Externals and sub-suppliers exempt. Supply-chain risk persists.
FAQ
Passkeys or hardware tokens, what is better?
Passkeys win on comfort, hardware tokens (FIDO2 sticks with attestation) win on sovereignty. For standard users Passkeys are right; for privileged roles hardware tokens are mandatory.
Is TOTP enough for NIS2 compliance?
For standard users today yes. For admins the market will shift to phishing-resistant in 2026/2027.
What does an MFA rollout cost?
Hardware tokens 30-90 EUR per unit plus logistics. Realistically 50-150 EUR per user total effort in the rollout year.
Related decision guides
Security
How to choose an IAM, IGA and PAM stack
Privileged Access Management
Choosing a PAM tool: vault, session recording, JIT under NIS2 and DORA
Compliance
How to reach NIS2 readiness as a mid-market or enterprise operator
Security
How to choose an EDR or XDR platform in 2026
Infrastructure
How to make a sovereign cloud migration decision
Related comparisons
DecisionOS vs Excel and slide decks
Spreadsheets work until the second stakeholder shows up.
DecisionOS vs RFP tools
RFP tools automate Q&A. DecisionOS runs the decision.
DecisionOS vs procurement suites
Procurement suites execute the purchase. DecisionOS makes the decision.
DecisionOS vs Notion
Notion stores knowledge. DecisionOS produces decisions.
DecisionOS vs Confluence
Confluence is a wiki. DecisionOS is a decision record.
Relevant industries
Banken & Finanzdienstleister
Banken entscheiden unter DORA, MaRisk, BAIT gleichzeitig. DecisionOS liefert das Memo, das alle drei Prüfer akzeptieren.
Versicherungen
Versicherer entscheiden unter DORA + Solvency II + VAIT gleichzeitig. Ein Memo-Format für alle drei.
Öffentlicher Sektor
Öffentlicher Sektor: NIS2 + UP KRITIS + BSI-Grundschutz + C5 gleichzeitig. Ein Memo-Format, das alle Prüfer bedient.
Gesundheitswesen
Gesundheitswesen: KRITIS + NIS2 + B3S + DSGVO Art. 9. DecisionOS macht das Memo prüfbar.
Manufacturing & Industrial
Manufacturing is a NIS2 important entity. OT security and supply-chain diligence are mandatory. The decision memo is the audit standard.
