Mask Group 89-1

Solve: Healthcare Multi-factor authentication (MFA)

NHS has now mandated to protect patient data and deliver patient care services via MFA controls.  

With the mandate that MFA is required to protect not just your email, but your online Applications, what are the options for your sector? 

 

What should you do? 

If you haven’t already, now is a good time to: 

  1. Understand the NHS mandate / policy - you can find it here
  2. Check if you are prepared with the health check below.  
  3. Analyse the best MFA options for your needs. 

MFA Mandate
For your Service Users, Carers, Staff, and your wider workforce:  

  1. Have you discovered and updated your data access flows?  
      1. E.g. where does your admission data come from and go to? 
      2. Do you have demographic data flowing from a trust to a hospital? 
      3. Are they included in your Combined Information Assets and Flows Register (IAFR)? 
  2. Is your organisation’s information asset register (IAR) up to date? 
  3. For your IAFRs, have you secured the data collection process itself? 
  4. Do you have an Identity Provider for authentication? 
  5. Have you configured Single Sign On (SSO) where possible?
  6. Already have multiple MFA, define your strategy and reduce costs

    Get in touch, we can walk you through the process
     

MFA options vary in cost and even security levels themselves. This can be very confusing to your staff and even partners. 
 
MFA Variations at the NHS include, Authenticator apps, SMS, Hardware tokens, Security Keys, Biometrics, Cards, however on most occasions a single option won’t be enough or practical for your part of the NHS. 
 
At Zero Trust Solutions we assess and offer independent advise on the most cost effective and best options for you, whether it’s Staff who do not want to use their personal device for work or for areas that do not allow mobile devices, shared workstations, multiple devices etc 
 
Talk to us on how we can help save you money, plus advise you on the best options to enable MFA and your Zero Trust roadmap

 

How to protect your accounts

One of the greatest threats against your personal security is an attacker taking control of an online account. With it, a threat actor can do all sorts of nefarious deeds in your name, and if they get control of your email account, they can use password recovery features to control even more of your accounts. Fortunately, multi-factor authentication (MFA) can protect against account takeovers. 


 

Mask Group 100
Group 24093

What is multi-factor authentication (MFA)? 

You are probably likely familiar with the username and password authentication method. However, passwords have several problems. Humans aren’t the best at remembering passwords and are even worse at picking unique, complex passwords  that can stand up to attacks. What’s more, people tend to reuse passwords, meaning that if one account is compromised, all the other accounts with the same password are also at risk. 

Multi-factor authentication, sometimes known as two-factor authentication or 2FA, seeks to change that by using more than one authentication factor. That doesn’t mean a second password, but at least any two from a list of three possible factors: 

  • Something you know
  • Something you have
  • Something you are

Multi-factor authentication (MFA) is widely recognised as one of the most effective ways to protect data and accounts from unauthorised access. This policy will ensure that MFA is used on digital systems throughout the health sector, with particular requirements on accounts that are remotely accessible or have privileged access to systems. 

Both the policy and guidance are aimed at senior IT leads, cyber security leads or any other appropriate person in organisations.

The policy has been adopted by the Department of Health and Social Care as guidance under s3(3)(b) of the Network and Information Systems (NIS) Regulations 2018. Organisations that are designated under the Regulations as operators of essential services for the health sector have a statutory obligation under s10(4) to have regard to such guidance. 
 
This policy currently applies to: 

  • NHS trusts and foundation trusts
  • integrated care boards
  • arm’s length bodies of the Department of Health and Social Care
  • commissioning support units in NHS England
  • operators of essential services for the health sector in England as designated under the NIS Regulations 

The accompanying guidance provides further details on how cyber, IT or the appropriate leads within your organisation can apply MFA within their own organisation and includes exemptions and scenarios to support implementation.

 

NHS Logo

Something you know is typically a password. It lives in your head and is ideally known only to you. Something you have could be a USB security key or an authenticator app on your phone. It’s something that isn’t easy for a stranger to access or obtain. Finally, something you are is a physical characteristic that can be read with a biometric scan – such as a fingerprint scan or facial recognition. 

Because it’s extremely unlikely an attacker will have more than one of these forms of authentication, MFA makes it much harder for threat actors to take over accounts. For example, when Google required their employees to use hardware MFA keys, account takeovers effectively vanished. 

MFA has become a mainstay of the security industry over the past decade. The first generation of MFA commonly used a one-time authentication code sent over SMS. So, if you’ve ever had to input a one-time password (typically a series of six or eight numbers) then you’ve used MFA without knowing it. 

Phase-6-assets-multifactor-authentication-2

The five most common multi-factor authentication methods

np_password_4954169_000000

SMS-based one-time passwords (OTPs): where you log in with your username and password, and you're sent a 6 to 8-digit one-time password (OTP) that's different every time.

np_usb_1046073_000000

Hardware one-time password (OTP) tokens: hardware-based devices are usually in the form of a dongle on your keyring, smart card, or USB key.  These devices generate one-time codes based on a cryptographic key stored inside the device.

np_mobilephone_5116418_000000
One-time passcode mobile apps: an app you install from the app store on your mobile that you register as an MFA one-time password authenticator for a particular online account.
np_phone-security_2411093_000000
Soft token software development kits (SDKs): software that can be embedded into a mobile app.  The app then utilises cryptographic operations to authenticate the user and device using the mobile operating system's biometric authentication capabilities.
Healthcare MFA - Facial Detection
Face Detection Technology : Proprietary facial biometrics solution to verify and uniquely identify the authenticating user. Our facial biometrics pipeline is based on many years of research and includes liveness check, face detection, and face recognition.

Choosing the best multi-factor authentication for your Healthcare organisation

When shopping for a USB security key, you should look for FIDO U2F certification, which means it should work with most basic security key applications.   

FIDO2/Web Authentication (WebAuthn) is the future-proof next-generation standard that can support additional types of authentication. If you want to use a device for biometric MFA or passwordless login, you’ll need FIDO2/WebAuthn. 

Group 25161

Contact us by filling out the form below

Why ZTS?

 

We are a Zero Trust consultancy.

Our Zero Trust Solutions consultants can help you choose the right multi-factor authentication type for your business.  We factor in many concerns, including:

  • How the MFA will help with your passwordless and your Zero Trust journey
  • Accessibility concerns across your organisation
  • An end-to-end lifecycle process to account for loss, upgrades and stolen devices.
Contact us directly