Setting Up Two-Step Verification on Common Platforms
Two-step verification (2SV) — also called two-factor authentication (2FA) or multi-factor authentication (MFA) — is a login security layer that requires a second proof of identity beyond a password alone. This page covers the definition and regulatory scope of 2SV, the technical mechanisms that underpin it, the platforms and professional contexts where it applies, and the criteria that differentiate appropriate verification methods. Professionals seeking cyber safety listings or context on how this reference is structured can consult the directory purpose and scope page.
Definition and scope
Two-step verification is an authentication architecture in which access to an account or system requires at least two distinct credential factors from separate categories: something the user knows (a password or PIN), something the user has (a physical token, mobile device, or hardware key), or something the user is (a biometric identifier such as a fingerprint or facial scan). The National Institute of Standards and Technology defines MFA formally in NIST Special Publication 800-63B (Digital Identity Guidelines), establishing that authentication assurance levels (AAL1, AAL2, AAL3) correspond to progressively stronger factor combinations.
Regulatory scope extends across multiple sectors. The Federal Trade Commission's Safeguards Rule under the Gramm-Leach-Bliley Act (16 CFR Part 314) requires financial institutions to implement MFA for any individual accessing customer information. The Department of Health and Human Services enforces MFA-adjacent technical safeguard standards under HIPAA Security Rule 45 CFR § 164.312(d), which mandates unique user identification and person authentication for electronic protected health information. The Cybersecurity and Infrastructure Security Agency (CISA) specifically designates MFA as one of its three core cybersecurity practices in its #StopRansomware guidance, applicable across 16 designated critical infrastructure sectors.
At the consumer platform level, 2SV has no single federal mandate for general-purpose accounts, but sector-specific rules and state breach-notification frameworks create strong compliance incentives. NIST SP 800-63B classifies password-only authentication as AAL1 — the lowest assurance level — while hardware-backed phishing-resistant methods such as FIDO2 keys satisfy AAL3.
How it works
The 2SV process follows a discrete sequence regardless of platform or factor type:
- Primary credential submission — The user enters a username and password, completing the first factor (knowledge).
- Second factor challenge — The platform issues a challenge requiring proof of possession or biometric confirmation.
- Factor delivery or generation — A time-based one-time password (TOTP) is generated by an authenticator app, a push notification is sent to a registered device, an SMS code is transmitted to a phone number, or a hardware key is prompted for physical interaction.
- Factor verification — The platform's authentication server validates the response within a defined time window (TOTP codes typically expire in 30 seconds per RFC 6238, the TOTP standard published by the IETF).
- Session establishment — On successful verification, a session token is issued and access is granted.
The four primary second-factor types differ significantly in security posture:
| Factor Type | Protocol/Standard | Phishing Resistance | NIST AAL |
|---|---|---|---|
| SMS one-time code | Carrier-dependent | Low | AAL2 (deprecated by NIST) |
| TOTP authenticator app | RFC 6238 (TOTP) | Moderate | AAL2 |
| Push notification | Vendor-proprietary | Moderate | AAL2 |
| Hardware security key (FIDO2/WebAuthn) | FIDO2/W3C WebAuthn | High | AAL3 |
NIST SP 800-63B formally restricts SMS-based OTP from higher-assurance use cases due to SIM-swapping and SS7 protocol vulnerabilities. The FTC has referenced this concern in enforcement contexts involving financial account takeovers.
Common scenarios
Consumer accounts (email, social media, cloud storage): Major platforms including Google, Apple, and Microsoft offer TOTP-based and push-based 2SV through their native authenticator applications. Google's account security infrastructure supports FIDO2 hardware keys in addition to TOTP and SMS. Apple's two-factor authentication delivers a 6-digit code to trusted devices and phone numbers via its proprietary push architecture. Microsoft Authenticator supports both TOTP and passwordless push verification under the Microsoft identity platform.
Enterprise and workplace systems: Federated identity environments using SAML 2.0 or OpenID Connect integrate MFA at the identity provider layer. Platforms such as Okta, Azure Active Directory (now Microsoft Entra ID), and Google Workspace enforce MFA policies organizationally. For organizations subject to the FTC Safeguards Rule, MFA must be enabled for all personnel accessing customer financial information — a requirement that took effect in June 2023 per the revised 16 CFR Part 314.
Government and regulated systems: Federal civilian agency systems follow NIST SP 800-53 Rev 5 control IA-2, which mandates MFA for privileged accounts and network access. PIV (Personal Identity Verification) cards issued under FIPS 201-3 provide hardware-backed phishing-resistant authentication meeting AAL3. State government obligations vary; Florida Statutes § 282.318 requires state agencies to implement security controls aligned with NIST standards, which include MFA requirements.
For additional context on navigating cybersecurity service categories, the how to use this cyber safety resource page describes the directory's classification structure.
Decision boundaries
Selecting an appropriate 2SV method involves weighing assurance requirements, threat model, user population, and regulatory floor.
SMS vs. authenticator app: SMS OTP is the lowest-friction option for consumer onboarding but carries documented susceptibility to SIM-swapping attacks. CISA's MFA guidance explicitly recommends moving away from SMS toward app-based or hardware methods. TOTP authenticator apps (such as those implementing RFC 6238) are substantially more resistant to interception because code generation occurs locally on the device without network transmission.
Authenticator app vs. hardware key: TOTP apps satisfy AAL2 under NIST SP 800-63B but remain vulnerable to real-time phishing — an attacker who proxies login traffic can capture and immediately replay a valid TOTP code. FIDO2 hardware keys and passkeys eliminate this vector entirely through a cryptographic challenge-response bound to the legitimate origin domain, satisfying AAL3 and qualifying as phishing-resistant MFA under CISA's definition.
When SMS is acceptable: For low-risk consumer accounts where no regulated data is involved and hardware key enrollment is operationally impractical, SMS 2SV remains meaningfully better than no second factor. NIST SP 800-63B permits SMS at AAL2 with a restricted authenticator designation, meaning it is allowed but carries additional risk acknowledgment requirements for agencies that choose it.
Platform-specific limitations: Not all platforms expose all factor types. Recovery paths — backup codes, fallback phone numbers, account recovery keys — introduce their own attack surfaces. Backup codes function as static passwords and should be treated with equivalent storage discipline.
Regulatory floor vs. operational ceiling: The minimum required by regulation (e.g., AAL2 for HIPAA-covered entities, phishing-resistant MFA for federal privileged accounts) defines the compliance floor. Risk-based analysis under frameworks like the NIST Cybersecurity Framework's Identify and Protect functions may justify a higher ceiling depending on data sensitivity, threat actor profile, and incident history.
References
- NIST Special Publication 800-63B: Digital Identity Guidelines — Authentication and Lifecycle Management
- NIST Special Publication 800-53 Rev 5 — Security and Privacy Controls for Information Systems (Control IA-2)
- FIPS 201-3: Personal Identity Verification of Federal Employees and Contractors
- CISA — More Than a Password: MFA Guidance
- CISA — #StopRansomware
- FTC Safeguards Rule — 16 CFR Part 314 (eCFR)
- HHS HIPAA Security Rule — 45 CFR § 164.312
- [