Multifactor Authentication
Implement multifactor authentication (MFA) for all IT and OT asset access based on your organizational policy, prioritizing privileged accounts, remote connections, and critical infrastructure systems. This C2M2 MIL2 requirement mandates authentication beyond passwords to protect operational technology environments.
Key takeaways:
- MFA is mandatory for IT and OT assets per organizational policy under C2M2 ACCESS-2.D
- Priority implementation areas: privileged access, remote connections, critical systems
- Document your MFA policy scope, implementation evidence, and exception handling
- Common audit failures: incomplete coverage, missing policy documentation, weak second factors
- Plan phased rollout starting with highest-risk access paths
The C2M2 ACCESS-2.D requirement mandates multifactor authentication implementation across both IT and operational technology environments. Unlike typical enterprise MFA deployments focused solely on IT systems, this requirement explicitly extends protection to OT assets — the industrial control systems, SCADA networks, and field devices that operate critical infrastructure.
Your organizational policy must define which systems require MFA, acceptable authentication factors, and any risk-based exceptions. Energy sector organizations face unique challenges implementing MFA in OT environments where legacy systems may lack modern authentication capabilities and operational continuity takes precedence over security controls.
This guide provides practical implementation steps, common audit findings, and a structured approach to achieving compliance while maintaining operational reliability.
Regulatory text
The C2M2 v2.1 ACCESS-2.D requirement states: "Multifactor authentication is implemented for access to IT and OT assets based on organizational policy."
This language grants organizations flexibility to define MFA scope through policy while establishing the baseline expectation that both IT and OT environments require protection. The phrase "based on organizational policy" means you must document your MFA implementation decisions, risk assessments, and any compensating controls for systems that cannot support modern authentication methods.
Who This Applies To
This requirement applies to:
- Energy sector organizations implementing C2M2
- Critical infrastructure operators with OT environments
- Any entity with industrial control systems requiring cybersecurity maturity assessment
- Organizations pursuing MIL2 maturity level compliance
Operational contexts requiring special attention:
- Control rooms with shared workstations
- Field technician access to remote sites
- Emergency response scenarios requiring rapid access
- Legacy OT systems without native MFA support
- Third-party vendor access to critical systems
Implementation Requirements
1. Develop Your MFA Policy
Create a comprehensive policy documenting:
- Systems and access types requiring MFA
- Approved authentication factors (something you know, have, or are)
- Risk-based criteria for MFA enforcement
- Exception request and approval process
- Emergency bypass procedures
Your policy must explicitly address both IT and OT environments. Many organizations make the mistake of copying enterprise IT policies without considering OT operational constraints.
2. Inventory Access Points
Document all access paths to IT and OT assets:
- Direct console access
- Remote desktop connections
- VPN access
- Web-based management interfaces
- API and programmatic access
- Maintenance laptops and portable media
- Third-party support connections
3. Select Appropriate MFA Methods
For IT environments:
- Hardware tokens (FIDO2, smart cards)
- Software tokens (authenticator apps)
- SMS/voice (discouraged but acceptable for lower-risk access)
- Biometric factors
For OT environments, consider:
- Physical token solutions that work offline
- Certificate-based authentication for system-to-system communication
- Time-based one-time passwords (TOTP) for air-gapped networks
- Proximity cards combined with PINs for control room access
4. Address OT-Specific Challenges
Legacy OT systems often lack native MFA support. Implement compensating controls:
- Jump servers with MFA protecting legacy system access
- Network segmentation limiting direct access
- Session recording and monitoring
- Physical security controls for local access
- Privileged access management (PAM) solutions
5. Implement Phased Rollout
Deploy MFA systematically:
- Start with highest-privilege accounts
- Extend to remote access paths
- Cover critical OT systems
- Address remaining systems based on risk assessment
- Monitor and adjust based on operational impact
Required Evidence and Artifacts
Maintain these documents for audit:
- MFA Policy Document - Signed and dated, covering both IT and OT
- System Inventory - Listing MFA implementation status for each asset
- Risk Assessment - Documenting systems without MFA and compensating controls
- Implementation Evidence - Screenshots, configuration files, or attestations
- Exception Register - Approved exceptions with business justification
- Training Records - User education on MFA usage
- Incident Reports - Any MFA-related access issues or bypasses
Common Audit Questions and Issues
Auditors typically focus on:
Coverage Completeness
- "Show me your inventory of systems requiring MFA"
- "How do you ensure new systems receive MFA configuration?"
- "What percentage of privileged accounts use MFA?"
Policy Alignment
- "Where does your policy address OT system authentication?"
- "How do you handle emergency access scenarios?"
- "Show me your exception approval process"
Implementation Quality
- "What factors constitute your MFA implementation?"
- "How do you prevent MFA bypass through alternate access paths?"
- "Demonstrate MFA enforcement for remote access"
Common audit findings:
- Incomplete Coverage - MFA implemented for IT but not OT systems
- Weak Second Factors - Over-reliance on SMS despite known vulnerabilities
- Policy Gaps - Missing OT considerations or exception procedures
- Bypass Paths - Local console access lacking MFA protection
- Third-Party Gaps - Vendor support access without MFA enforcement
Implementation Mistakes to Avoid
1. IT-Centric Approach
Don't copy enterprise IT authentication directly to OT. Industrial environments require solutions that:
- Function during network outages
- Allow rapid emergency access
- Support technicians wearing safety equipment
- Work with legacy protocols and interfaces
2. All-or-Nothing Deployment
Attempting to enable MFA everywhere simultaneously causes operational disruption. Use risk-based prioritization and phased implementation.
3. Inadequate Exception Handling
Some systems genuinely cannot support MFA. Document these cases thoroughly with:
- Technical limitations preventing MFA
- Compensating controls implemented
- Risk acceptance by appropriate authority
- Review schedule for reassessment
4. Ignoring User Experience
OT operators work under time pressure. MFA methods must:
- Allow authentication while wearing gloves
- Function in harsh environments
- Provide rapid authentication for emergency response
- Include clear failure recovery procedures
5. Weak Administrative Controls
Technical MFA implementation fails without supporting processes:
- Token lifecycle management
- Lost token procedures
- Temporary access protocols
- Regular access reviews
Risk and Enforcement Context
While C2M2 operates as a maturity model rather than a prescriptive regulation, MFA implementation directly impacts:
- NERC CIP compliance for bulk electric systems
- TSA Security Directives for pipeline operators
- Insurance coverage and premiums
- Incident response capabilities
- Third-party risk assessments
Organizations without proper MFA face increased risk of:
- Unauthorized access to critical infrastructure
- Lateral movement following initial compromise
- Insider threat exploitation
- Compliance findings in sector-specific audits
Execution Plan
Immediate Priority Actions
- Form MFA implementation team including IT, OT, and operations representatives
- Document current authentication methods across all systems
- Identify highest-risk access paths (remote access, privileged accounts, critical OT)
- Draft initial MFA policy covering both IT and OT environments
- Begin procurement process for MFA solutions compatible with your environment
Near-Term Implementation
- Deploy MFA for all remote access methods
- Implement MFA for privileged IT accounts
- Pilot MFA solutions for critical OT systems
- Establish exception handling process
- Train help desk on MFA support procedures
- Create emergency access protocols
Ongoing Maturation
- Extend MFA to remaining systems based on risk assessment
- Implement continuous monitoring for MFA bypass attempts
- Conduct quarterly access reviews
- Update policy based on operational experience
- Plan for technology refresh of systems incompatible with MFA
- Measure and report MFA adoption metrics
Frequently Asked Questions
Can we use SMS-based MFA for OT systems given their isolation from internet access?
SMS presents risks even in isolated environments. Consider hardware tokens or TOTP solutions that work offline. If SMS is your only option, document it as a compensating control and plan migration to stronger factors.
How do we handle shared operator workstations in control rooms where multiple users need rapid access?
Implement fast user switching with individual MFA tokens, proximity card + PIN combinations, or consider session-based MFA where authentication persists for defined operational periods with appropriate monitoring.
What constitutes acceptable MFA for legacy OT systems that can't be modified?
Use jump servers or PAM solutions with MFA to broker access. The MFA occurs at the intermediate system, providing documented protection even when the end system lacks native support.
Our emergency response procedures conflict with MFA requirements. How do we balance security with operational safety?
Document break-glass procedures allowing MFA bypass under defined emergency conditions. Include compensating controls like video recording, dual authorization, immediate alerting, and post-incident review requirements.
Do service accounts and system-to-system communications require MFA?
The requirement focuses on human access to IT and OT assets. However, implement certificate-based authentication or API keys with appropriate rotation for automated access, documenting your approach in policy.
How frequently should we review MFA implementation and exceptions?
Conduct quarterly reviews of exceptions and annual reassessment of overall MFA architecture. Technology improvements may enable MFA on previously incompatible systems.
Frequently Asked Questions
Can we use SMS-based MFA for OT systems given their isolation from internet access?
SMS presents risks even in isolated environments. Consider hardware tokens or TOTP solutions that work offline. If SMS is your only option, document it as a compensating control and plan migration to stronger factors.
How do we handle shared operator workstations in control rooms where multiple users need rapid access?
Implement fast user switching with individual MFA tokens, proximity card + PIN combinations, or consider session-based MFA where authentication persists for defined operational periods with appropriate monitoring.
What constitutes acceptable MFA for legacy OT systems that can't be modified?
Use jump servers or PAM solutions with MFA to broker access. The MFA occurs at the intermediate system, providing documented protection even when the end system lacks native support.
Our emergency response procedures conflict with MFA requirements. How do we balance security with operational safety?
Document break-glass procedures allowing MFA bypass under defined emergency conditions. Include compensating controls like video recording, dual authorization, immediate alerting, and post-incident review requirements.
Do service accounts and system-to-system communications require MFA?
The requirement focuses on human access to IT and OT assets. However, implement certificate-based authentication or API keys with appropriate rotation for automated access, documenting your approach in policy.
How frequently should we review MFA implementation and exceptions?
Conduct quarterly reviews of exceptions and annual reassessment of overall MFA architecture. Technology improvements may enable MFA on previously incompatible systems.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream