Multi-Factor Authentication (MFA) and Cyber Essentials: Why Partial Deployment Is Not Sufficient
- The Assessor Team
- 13 hours ago
- 3 min read

Multi-factor authentication (MFA) is a mandatory control within Cyber Essentials when using cloud services. One of the most common reasons organisations fail their Cyber Essentials assessment is incomplete or selective deployment of MFA.
This article is based on the National Cyber Security Centre (NCSC) guidance Multi-factor authentication for your corporate online services. It explains what is required, why it is required, and why Cyber Essentials controls are not met if MFA is not applied correctly and universally.
If you are completing a Cyber Essentials self-assessment, or responding to assessor feedback, this article should be treated as a baseline reference.
The Core Cyber Essentials Rule on MFA
Under Cyber Essentials:
If a cloud service supports MFA, it must be enabled for all user accounts and all administrator accounts.
This includes:
Standard user accounts
Privileged or administrator accounts
Accounts used for remote access
Accounts accessing data or services over the internet
Partial rollout or selective application is not acceptable.If MFA is available but not enforced universally, Cyber Essentials requirements are not met.
For further context, see the NCSC guidance on why MFA matters.
1. Why MFA Matters
Passwords alone are no longer sufficient to protect cloud services. Credential theft via phishing, malware, or password reuse remains a leading cause of compromise. MFA protects accounts by requiring:
Something the user knows (password), and
Something the user has or is (authenticator app, hardware token, biometrics)
Cyber Essentials aligns with this guidance. If MFA is not enforced across all eligible accounts, attackers can compromise a single unprotected account, violating Cyber Essentials requirements.See Why MFA Matters for more detail.
2. Recommended Types of MFA
The NCSC identifies different strengths of MFA and recommends adopting the strongest available methods:
Authenticator apps (time-based one-time passwords)
Hardware security keys (FIDO2/WebAuthn)
Push notifications with number matching
SMS or voice codes (weaker, but still MFA)
Cyber Essentials requires that any supported MFA method must be implemented for all accounts. For a detailed breakdown, see Recommended types of MFA.
3. Mandatory MFA for Sensitive and Administrator Accounts
The NCSC guidance emphasises that MFA must be enforced for sensitive accounts and administrator accounts. Cyber Essentials is explicit:
All administrator accounts must have MFA enabled
All accounts that can access sensitive data must have MFA enabled
Emergency accounts or break-glass accounts must also use MFA
Failing to apply MFA universally results in non-compliance. Reference: Mandating strong MFA for access to sensitive data.
4. Trust in Devices
Some organisations rely on “trusted devices” or domain-joined computers instead of MFA. The NCSC clarifies:
Device trust complements MFA – it does not replace it.
For operational guidance on establishing trust without bypassing MFA requirements, see Gaining trust in devices.
5. Choosing Online Services with the Right Authentication
When selecting cloud services, organisations must ensure MFA is supported and enforced. If a service supports MFA, it must be enabled for all users; if not, the absence must be documented.
More guidance: Choosing online services with the right authentication.
6. Avoiding MFA Anti-Patterns
The NCSC highlights common MFA anti-patterns that do not satisfy Cyber Essentials:
MFA only for administrators or remote users
Optional MFA for standard users
Knowledge-based second factors
IP restrictions or device recognition alone
See Avoiding MFA anti-patterns for more information.
7. Implementation and Operational Considerations
Successful MFA implementation requires careful planning and ongoing management:
Inventory all systems and cloud services
Enforce MFA via identity providers where possible
Document any exceptions clearly
Train users on MFA usage and recovery
Monitor and review for anomalies
Full operational guidance can be found in Implementation and operational considerations.
Key Takeaways: MFA and Cyber Essentials Compliance
MFA must be enabled wherever a cloud service supports it
MFA must apply to all users and all administrators
Partial deployment does not meet Cyber Essentials requirements
Exceptions or delayed rollouts do not remove the compliance obligation
For further reading, the full NCSC collection is available here: Multi-factor authentication for your corporate online services.
If MFA is not applied correctly across all accounts, Cyber Essentials controls are not met, and the assessment will result in non-compliance.




Comments