1. Purpose of this Guide
This artefact proves your company has enforced MFA across user accounts, not just made it optional. Cyber Essentials requires this because passwords alone are a rickety drawbridge; MFA adds a second gate — a code, token, or app approval — making it much harder for attackers to sneak in with stolen credentials.
2. What You Will Submit
You will need:
-
A screenshot from your identity provider (IdP) or admin console showing:
-
MFA enforcement enabled for users.
-
Status that indicates “Enforced” or “Required”, not just “Available.”
-
Coverage across the organisation or specific groups (admins, staff, etc.).
-
3. How to Collect / Obtain / Generate This Evidence
For StrongKeep users:
-
Log into the StrongKeep Password Manager → Reports
-
Select MFA
-
Click Generate Report.
-
Download the screenshot/report.
Microsoft Entra (Azure AD):
-
Go to Entra Admin Center → Users → Per-user MFA.
-
Look for status = Enforced.
-
Screenshot showing at least one enforced account (ideally all relevant users).
Google Workspace:
-
Open Admin Console → Security → Authentication → 2-step verification.
-
Ensure enforcement is ON for organisational units or all users.
-
Screenshot showing enforcement, not just availability.
Okta / Other IdPs (Duo, OneLogin):
-
Log into admin console.
-
Navigate to Authentication / Security Policies.
-
Screenshot showing MFA required for sign-ins.
4. Evidence Format
-
Accepted file types: PNG, JPG, PDF.
-
Suggested naming format:
YourCompanyName_MFAEnforcement_YYYY-MM-DD.png
Example:AcmeCorp_MFAEnforcement_2025-07-01.png
5. What “Good” Looks Like
-
Status clearly shows MFA enforced (not optional).
-
Screenshot taken from the official IdP console (Microsoft Entra, Google Admin, Okta, etc.).
-
Evidence covers all relevant staff — especially admins and high-privilege accounts.
Why it matters: auditors want assurance that MFA isn’t just “available in theory” but practically enforced across your systems.
6. Tips
-
Redact personal names or emails from the screenshot before upload.
-
Enforce MFA organisation-wide where possible; partial coverage may raise questions.
-
Combine this with your Access Request Process evidence to show end-to-end strong account security.