nexalign

Decision guide · Identity and Authentication

Planning an MFA rollout: phishing-resistant authentication under NIS2 and DORA

MFA is mandatory under NIS2 Art. 21 (j) and DORA Art. 9. But MFA is not MFA: SMS OTP and email codes are no longer acceptable for privileged access in 2026. Phishing-resistant MFA with FIDO2 or Passkeys is the state of the art, especially after the AiTM proxy waves of 2023-2025.

TL;DR

Weak MFA (SMS, TOTP) is not enough in 2026. Phishing-resistant MFA is mandatory for privileged access.

Who owns this decision

CISO with IT operations and HR/change management. Data Protection in the steering group (biometrics review).

Key criteria to weight

  • Phishing resistance per NIST AAL3

    FIDO2 / WebAuthn with hardware attestation is state of the art.

  • Coverage of all apps and devices

    An MFA gap is an attack surface. Legacy apps need a gateway solution.

  • User experience and acceptance

    Passkeys win because of comfort. Hardware tokens only for privileged roles.

  • Backup factor and lost-token process

    Without recovery, MFA blocks productivity.

  • Integration with IAM and IGA

    Factors must be differentiated by role, risk and app.

  • Conditional Access and risk-based MFA

    Adaptive MFA reduces friction and catches anomalies.

Step-by-step decision flow

  1. 1

    Inventory

    Which apps have MFA active, which factors, which user groups. Find gaps.

  2. 2

    Factor strategy

    Per role and app: drop SMS OTP, TOTP for standard users, FIDO2/Passkeys for privileged.

  3. 3

    Pilot with power-user group

    Admins and power users with hardware keys (YubiKey, SoloKey). Lessons feed the rollout concept.

  4. 4

    Phased rollout

    Wave 1 admins, wave 2 Finance/HR/Legal, wave 3 all staff, wave 4 externals and sub-suppliers.

  5. 5

    Memo, training, telemetry

    Decision memo with stakeholder alignment. Training. Telemetry to detect MFA bypass.

Compliance note

NIS2 Art. 21 (j), DORA Art. 9, BAIT BTO 6, ISO 27002 A.8.5.

Common pitfalls

  • !MFA is only enabled in Microsoft 365; other apps remain open.
  • !SMS OTP is kept 'because easier'. AiTM phishing breaks it.
  • !Backup factor missing. Helpdesk overwhelmed with reset requests.
  • !Externals and sub-suppliers exempt. Supply-chain risk persists.

FAQ

Passkeys or hardware tokens, what is better?

Passkeys win on comfort, hardware tokens (FIDO2 sticks with attestation) win on sovereignty. For standard users Passkeys are right; for privileged roles hardware tokens are mandatory.

Is TOTP enough for NIS2 compliance?

For standard users today yes. For admins the market will shift to phishing-resistant in 2026/2027.

What does an MFA rollout cost?

Hardware tokens 30-90 EUR per unit plus logistics. Realistically 50-150 EUR per user total effort in the rollout year.