1. Are your users still using passwords as the first Factor in authentication? All of our applications require passwords. Some of our applications still require passwords. None of our applications use passwords.
2. What is your second authentication factor for most of your applications? Authenticator app. SMS (One-Time Password). Email (One-Time Password). Smart card. FIDO Key/YubiKey.
3. Do you use the same first and second authentication factors for all your applications, or do some apps require different methods? Yes, the authentication methods are the same for all applications. No, some applications require different authentication methods.
4. Can users share login credentials within your organization (for example, sharing passwords and one-time PINs)? Yes, users can potentially share their access credentials. No, users are systematic restricted to share their access credentials.
5. What are your main priorities for identity security? Compliance with regulations (e.g., DORA). General system resilience and security. Updating the overall security strategy. Response to a recent security incident.
6. How many users are there in your organization? 1–100. 101–1,000. 1,001–10,000. More than 10,000.
Email
Comments