Cyber Essentials MFA: Replace Weak 2FA with Phishing-Resistant Authentication

September 18, 2025 by Trenton Thurber

Cyber Essentials MFA: Replace Weak 2FA with Phishing-Resistant Authentication

Executive Summary

Cyber Essentials v3.2 raises expectations: all cloud services must use MFA, with stronger methods recommended over SMS when available. Organisations should adopt phishing-resistant authentication to cut AiTM and push-fatigue risk, but there doesn’t need to be just one way to do it. You can satisfy CE while improving UX via either of two mature technologies:

  1. FIDO2/WebAuthn passkeys, widely supported across browsers, OSs and modern IdPs.

  2. WWPass, a passwordless, usernameless approach using the WWPass Key app and client-side crypto to remove usernames/passwords and enable strong MFA and SSO.

Bottom line: pick one, or run both where it makes sense. Cyber Essentials cares that MFA is enforced and robust, not that everyone uses the same brand of authenticator.


Plain-English Definitions


Why “Weak 2FA” Fails, and Why Two Strong Alternatives Are Better

Why Weak 2FA Fails, and Why Two Strong Alternatives Are Better

Attacks bypassing legacy 2FA: adversary-in-the-middle (AiTM) proxying, SIM-swap on SMS, and “push-bombing” user fatigue. NCSC and CISA push organisations toward phishing-resistant approaches to shut these down.

Two strong choices:


NCSC & CE Guidance (What “Good” Looks Like)


Quick Comparison: Weak 2FA vs. Phishing-Resistant Options

AreaWeak 2FA (SMS/OTP/Push)FIDO2/WebAuthn PasskeysWWPass (Passkey-implementation)
Phishing/AiTMCodes can be proxied or stolenOrigin-bound crypto thwarts replayNo passwords; QR approach reduces phishing paths
SIM-swap riskHigh for SMSNoneNone
UXInterruptive; push fatigueFast biometric/tapScan/tap QR with mobile app; no username/password
CE alignmentCompliant but discouraged if stronger existsStrongly recommended by NCSCMeets CE goal of strong MFA/passwordless
CoverageVariesBroad (OS/Browser/IdP support)Broad via WWPass SSO/MFA platform

Mapping CE MFA to Your Access Control Policy

Mapping CE MFA to Your Access Control Policy

Embed these anchors (adapted and expanded from your original guide):

  1. Scope: Enforce MFA for all cloud services, admin, and internet-exposed accounts.

  2. Preferred Methods: Mandate phishing-resistant options (choose FIDO2/WebAuthn or WWPass per system capability).

  3. Enrollment & Recovery: Require at least two strong authenticators per user (e.g., platform passkey + security key or WWPass Key on two devices with recovery configured).

  4. Admin Separation: Use dedicated admin accounts with strong MFA.

  5. Federation First: Prefer IdP-centric enforcement; if not possible, enable MFA in-app.

  6. Zero-Trust Alignment: Pair strong MFA with device and context checks. (Aligned with government playbooks.)


Architecture Patterns That Satisfy CE (and Reduce Risk)

  1. IdP-Centric (Recommended): Enforce either FIDO2/WebAuthn or WWPass at your IdP (e.g., Azure AD/Entra, Okta, Ping) and federate apps via SAML/OIDC.

  2. Non-Federated SaaS: Turn on the strongest available MFA in each service (FIDO2 where supported; WWPass SSO gateway where appropriate) and capture evidence.

  3. Remote Access & Admin Consoles: Treat VPN/RDP/VDI as internet-exposed; prefer phishing-resistant methods.


Implementation Guide (Weeks 1–10)

Phase 1 (Weeks 1–2): Plan & Inventory

Phase 2 (Weeks 2–4): Tenant Controls & Pilots

Phase 3 (Weeks 4–8): Enrolment at Scale

Phase 4 (Weeks 8–10): Close Gaps & Evidence


Buyer’s Checklist (for RFPs/Vendors)

Buyer’s Checklist

Policy Language You Can Copy

MFA Requirement: All cloud services, administrator accounts, and internet-exposed systems must enforce multi-factor authentication. The organisation prefers phishing-resistant methods and will implement either FIDO2/WebAuthn passkeys or WWPass where supported. SMS/email OTP may be used only as a documented fallback with compensating controls.


FAQs

Does Cyber Essentials mandate phishing-resistant MFA?

CE mandates MFA and advises stronger methods than SMS when alternatives are available. You can meet this using FIDO2/WebAuthn or WWPass.

Is FIDO2 the only “right” answer?

No, NCSC recommends FIDO2 highly, but CE’s goal is robust MFA. WWPass achieves passwordless, phishing-resistant outcomes via a different UX and crypto flow. Many estates benefit from running both.

What if some users can’t use security keys?

Use platform passkeys (Windows Hello, Touch ID) or deploy WWPass Key on managed mobiles; both avoid SMS.

How does WWPass recover if a phone is lost?

WWPass provides an app-driven recovery using the email set during setup plus the user’s WWPass Key PIN, streamlining business continuity.