Episode 20 — Require strong multifactor authentication across all users
In this episode, we begin with a simple idea that has become one of the most reliable defenses in modern security: a password alone is not enough, especially in environments connected to payment systems. Beginners often think of passwords as secret keys that only the right person knows, but in real life passwords get guessed, stolen, reused, phished, leaked, and shared, sometimes without the user even realizing it happened. Multi-Factor Authentication (M F A) is designed to break that fragile dependency by requiring more than one kind of proof that you are who you claim to be. In the Payment Card Industry (P C I) context, this matters because access to the Cardholder Data Environment (C D E) and related systems is high value, and attackers frequently try to compromise accounts rather than break through technical controls directly. Strong M F A reduces the chance that a stolen password becomes immediate access, and it also reduces the chance that service provider accounts, administrative accounts, and remote access accounts become invisible backdoors. When you understand M F A clearly, you can see why it is required broadly and why the phrase across all users is a deliberate choice rather than a vague ambition.
Before we continue, a quick note: this audio course is a companion to our course companion books. The first book is about the exam and provides detailed information on how to pass it best. The second book is a Kindle-only eBook that contains 1,000 flashcards that can be used on your mobile device or Kindle. Check them both out at Cyber Author dot me, in the Bare Metal Study Guides Series.
A good foundation is understanding what a factor is, because the idea of multiple factors is more specific than it sounds. A factor is a category of proof, such as something you know, something you have, or something you are, and the security benefit comes from combining categories rather than repeating the same kind of proof twice. A password is something you know, but a second password is still something you know, so it is not truly multi-factor even if it feels like “two steps.” Something you have might be a physical device or an authentication app that can produce a changing code, while something you are might be a biometric like a fingerprint. The key idea is that an attacker who steals one factor should not automatically have the others, which forces them to defeat multiple independent barriers. Beginners sometimes assume that any extra prompt counts as M F A, but true M F A requires distinct factor types, not just multiple questions. When you can explain factors in this precise way, you are ready to judge what counts as strong and what is merely extra friction without real security gain.
M F A matters in P C I environments because the most common, scalable attacks target identity and access, not just software vulnerabilities. If an attacker can trick a user into giving up a password, they can often log in as that user from anywhere, and then they can explore the environment looking for privilege escalation and pathways into sensitive systems. This is especially dangerous for accounts that can access the C D E directly or that can administer systems that influence the C D E, because those accounts can bypass other controls quickly. Strong M F A changes the economics of attack because a stolen password is no longer enough, forcing the attacker to also compromise a second factor. Even when attackers are persistent, M F A buys defenders time and reduces the frequency of easy compromises, which is a practical win. Beginners sometimes ask why the standard is so strict, but strictness makes sense when you consider how often credentials are stolen and how much damage can occur when payment systems are accessed. M F A is therefore a control that directly reduces a high-probability threat.
To require M F A across all users, you first need a clear picture of what “all users” really means in an environment, because beginners often think it means only employees. In practice, user accounts can include administrators, developers, customer support staff, contractors, third-party vendors, and sometimes service accounts or non-human identities depending on the system. It also includes remote access users, which can be particularly risky because remote access brings the attack surface of the internet directly to your authentication boundary. It can include users who access cloud-based management consoles, users who access internal systems, and users who access shared tools like monitoring platforms that can impact the C D E. The reason the requirement is broad is that attackers look for the weakest account, not the most important account, and then they move from there. A single low-privilege account can become a stepping stone if it can access shared resources, request password resets, or reach systems that allow lateral movement. When you interpret all users as every identity that can touch important systems and pathways, the requirement becomes more logically grounded and less like an arbitrary rule.
Strong M F A is not only about having two factors, but also about choosing methods that resist common attacks, especially phishing and session hijacking. Some M F A methods can still be tricked if an attacker convinces a user to approve a prompt without understanding what it is, or if the attacker can intercept one-time codes through social engineering. Beginners sometimes assume that any second factor is equally strong, but strength depends on how easy it is for attackers to bypass the method. A strong approach emphasizes factors that are difficult to replay and difficult to approve accidentally, and it emphasizes user experience that encourages careful attention rather than blind clicking. The key point for beginners is not to memorize which method is best in every case, but to understand why some methods are stronger: they reduce the chance that an attacker can capture or reuse the second factor. When your M F A approach anticipates real attacker behavior, it becomes a genuine barrier rather than a compliance checkbox. That is what it means for M F A to be strong rather than merely present.
M F A also interacts deeply with the concept of authentication versus authorization, and beginners should keep these separate to avoid confusion. Authentication is proving who you are, which is what M F A strengthens, while authorization is what you are allowed to do after you have proven your identity. Strong M F A reduces the chance of an attacker pretending to be someone else, but it does not automatically limit what the account can do once logged in. This is why M F A must be paired with least privilege, because if a compromised account has excessive privileges, even a rare compromise can cause massive harm. In the P C I world, authentication and authorization work together to protect the C D E: M F A keeps impostors out, and least privilege limits what legitimate accounts can access. Beginners sometimes think M F A is a complete solution, but it is more accurate to view it as strengthening the front door while still needing sensible room-by-room locks inside the building. When you can articulate this relationship, you show a more complete understanding of access control.
Administrative access deserves special focus because administrative accounts are both high value and high impact, and they often have the power to change security controls. If an attacker compromises an administrative account, they can disable logging, modify segmentation rules, create new accounts, or access stored account data directly. Strong M F A is therefore especially important for administrative access to systems in the C D E or to systems that could-impact it, and it is also important for administrative access to identity systems themselves. Beginners sometimes assume that administrators are careful and therefore safe, but careful people can still be phished or have credentials stolen, and administrators are frequently targeted. M F A reduces the chance that a single stolen password becomes full control of the environment, which is a major risk reduction. It also helps defend against credential stuffing attacks, where attackers try passwords leaked from other sites, because even if the password is correct, the second factor blocks access. When you treat admin M F A as non-negotiable, you are protecting the highest leverage identities in the environment.
Remote access is another area where M F A must be treated as essential, because remote access expands the threat landscape dramatically. Remote access is often necessary for business, especially for distributed teams and service providers, but it also creates a direct path from the internet into internal systems. Beginners sometimes imagine that remote access is protected by being “hidden” or by requiring a special portal, but attackers actively search for remote access endpoints and attempt to compromise them with phishing and credential attacks. M F A makes remote access safer by ensuring that even if a password is stolen, the attacker still cannot easily enter. It also discourages password sharing because second factors are tied to individuals, which supports accountability. In a P C I environment, remote access is often a pathway to systems that influence the C D E, which makes it a high-risk seam that must be defended robustly. When M F A is enforced consistently for remote access, that seam becomes harder to exploit and easier to govern.
Service provider and vendor accounts deserve the same discipline as internal accounts, because third-party access can be both necessary and risky. A vendor might have access for support, monitoring, or infrastructure management, and those accounts can become powerful pathways if compromised. Shared responsibility means you must know how vendor access is authenticated and what controls protect it, rather than assuming the vendor’s internal policies automatically solve the problem. Beginners sometimes assume that vendors are more secure because they are specialists, but attackers frequently target vendors because compromising one vendor account can provide access to many customer environments. Strong M F A reduces this risk by making it harder for stolen passwords to be used, but it must be coupled with limited access scope and regular review of vendor accounts. It also helps to ensure that vendor access is tied to individuals rather than shared logins, because shared logins reduce accountability and make investigation harder. When you insist on strong M F A for vendor access, you are addressing a realistic, high-impact risk that has shown up repeatedly in real incidents.
A common beginner concern is usability, because people worry that M F A will slow work down or frustrate users. That concern is valid in the sense that poorly implemented M F A can create friction, but the right response is not to avoid M F A; it is to choose approaches that are both secure and usable enough to sustain. Security controls that users constantly bypass are not effective, and payment security demands controls that people can live with. A strong M F A program includes clear communication about why it exists, so users understand it as protection rather than punishment. It also includes thoughtful design of when M F A is required, such as at login, for high-risk actions, or when access patterns change, while still maintaining the core requirement that all relevant users have M F A. Beginners sometimes believe usability and security are opposites, but in practice, usable security is more secure because it is more likely to be followed. When you treat user experience as part of control strength, your M F A approach becomes more resilient.
M F A also needs to be connected to monitoring and incident response because authentication is not a one-time event, and attackers often try repeated attempts or exploit account recovery pathways. If you require M F A but do not monitor authentication patterns, you may miss signs of targeted attacks like repeated failures, unusual login locations, or suspicious reset activity. Beginners sometimes assume M F A eliminates the need for watching logins, but watching remains important because attackers can still attempt social engineering, can still compromise devices, and can still seek weaker recovery methods. Strong identity security includes understanding how accounts are recovered, how lost second factors are handled, and how quickly suspicious activity triggers investigation. This is not about adding complexity for its own sake; it is about closing the gaps attackers use when the main login is protected. When M F A is paired with monitoring and disciplined recovery practices, it becomes harder for attackers to defeat through indirect routes. That completeness is what makes the control hold in real environments.
Finally, requiring M F A across all users is closely connected to the broader theme of reducing reliance on single points of failure. Passwords are single points of failure because they can be stolen in bulk and reused across many services, and modern attackers exploit that reality at scale. M F A breaks that pattern by requiring a second, separate form of proof, which makes large-scale credential theft less immediately useful. In the payment security world, where protecting the C D E requires strong boundaries and strong identity controls, reducing single-factor dependence is one of the clearest ways to reduce real-world risk. It also supports a culture of accountable access, where identities are individual, access is deliberate, and sensitive actions are protected by stronger checks. Beginners sometimes think of M F A as a modern trend, but it is better understood as a response to the proven weakness of passwords in a connected world. When you adopt it consistently, you are aligning your security design with the threats that actually happen, not with the threats you wish would happen.
By the end of this lesson, the key takeaway is that strong M F A across all users is one of the most practical controls for reducing credential-based compromise, which is a common pathway into payment environments. You understand factors as distinct categories of proof, and you recognize that strong M F A requires methods that resist phishing and misuse rather than merely adding an extra step. You apply the requirement broadly because attackers target the weakest account and move from there, and you give special attention to administrative and remote access pathways because they offer high leverage into systems that can impact the C D E. You include service providers and vendors in the same discipline because shared responsibility does not reduce attacker interest, and you address usability and monitoring so the control remains sustainable and visible. When M F A is enforced consistently and thoughtfully, it turns stolen passwords from a direct breach path into a blocked attempt, and that shift in attacker success is exactly why PCI insists on it in environments that handle sensitive payment data.