Lack of Multi-Factor Authentication

Lack of Multi-Factor Authentication (MFA) control in Workday is a significant concern for security engineers as it can lead to unauthorized access to sensitive information and data breaches. MFA is an additional layer of security that requires users to provide more than one form of authentication, such as a password and a fingerprint or a text message code, in order to access an account.

One reason for the lack of MFA control in Workday is when organizations fail to implement it as a standard security measure. Without MFA, only a single form of authentication, such as a password, is required to access an account. This makes it easy for attackers to gain access to Workday accounts using a brute-force attack or a password cracking tool.

Another reason for the lack of MFA control in Workday is when users are not required to use it. Even when MFA is implemented, if users are not required to use it, they may choose not to, leaving their accounts vulnerable to unauthorized access.

To prevent lack of MFA control in Workday, security engineers should implement a number of security measures such as:

  • Implementing Multi-Factor Authentication (MFA) as a standard security measure for all Workday accounts.
  • Enforcing the use of MFA for all users, to ensure that all accounts are protected.
  • Conducting regular security awareness training for employees to educate them on the importance of MFA and how to use it.
  • Regularly monitoring Workday accounts for suspicious activity, such as login attempts from unfamiliar locations or changes to account settings.
  • Regularly reviewing and updating the policies and procedures for managing Workday accounts, including the process for resetting passwords and revoking access for terminated employees.
  • Keeping the MFA system up-to-date and testing it regularly to ensure that it's functioning properly.

By implementing these measures, security engineers can ensure that MFA is implemented and enforced for all Workday accounts, significantly reducing the risk of unauthorized access and data breaches.

Get our Security Checklist

Keep configuration drift at bay with the ThreatKey Security Checklist.

Remediate it with ThreatKey

Manage misconfigurations easily and continuously with ThreatKey! Get started today for free.

Remediate it!

Follow along with one of our reference guides to start securing your instance

No items found.