<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hrushikesh Shinde</title>
    <description>The latest articles on DEV Community by Hrushikesh Shinde (@rushiii3).</description>
    <link>https://dev.to/rushiii3</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3887853%2F5302da73-70d6-4615-a792-4bbaf037d85e.jpeg</url>
      <title>DEV Community: Hrushikesh Shinde</title>
      <link>https://dev.to/rushiii3</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rushiii3"/>
    <language>en</language>
    <item>
      <title>CIA Triad, Authentication &amp; Authorization in Cybersecurity (2026)</title>
      <dc:creator>Hrushikesh Shinde</dc:creator>
      <pubDate>Mon, 20 Apr 2026 05:03:45 +0000</pubDate>
      <link>https://dev.to/rushiii3/cia-triad-authentication-authorization-in-cybersecurity-2026-5cdh</link>
      <guid>https://dev.to/rushiii3/cia-triad-authentication-authorization-in-cybersecurity-2026-5cdh</guid>
      <description>&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;The CIA Triad — Confidentiality, Integrity, and Availability — is the foundational framework for every security control in existence.&lt;/strong&gt; Every firewall rule, encryption policy, backup procedure, and access control maps to one or more of these three principles. &lt;strong&gt;Authentication verifies identity; authorization determines access; non-repudiation proves accountability.&lt;/strong&gt; Understanding how these concepts interact is essential for evaluating whether any security control is fit for purpose and whether a given defense addresses the actual threat it faces.&lt;/p&gt;




&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;The CIA Triad is not a compliance checkbox — it is the analytical framework that determines whether a security control addresses the actual threat it is deployed against. A control that protects confidentiality does nothing for availability. A control that ensures integrity does not prevent unauthorized access. Knowing which triad component a control addresses tells you exactly what it protects against and — critically — what it does not.&lt;/p&gt;

&lt;p&gt;This post covers the CIA Triad, non-repudiation, and the authentication and authorization mechanisms that implement these principles in practice.&lt;/p&gt;




&lt;h2&gt;
  
  
  The CIA Triad
&lt;/h2&gt;

&lt;p&gt;The CIA Triad represents the three fundamental principles that define what "security" means for any asset — data, system, network, or physical resource.&lt;/p&gt;

&lt;p&gt;The three CIA Triad components compared by definition, primary threats, and key protection methods:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Principle&lt;/th&gt;
&lt;th&gt;Definition&lt;/th&gt;
&lt;th&gt;Primary Threats&lt;/th&gt;
&lt;th&gt;Key Controls&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Information accessible only to authorized parties&lt;/td&gt;
&lt;td&gt;Unauthorized access, eavesdropping, data breaches&lt;/td&gt;
&lt;td&gt;Encryption, access controls, MFA, steganography&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Integrity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Data accuracy and trustworthiness maintained&lt;/td&gt;
&lt;td&gt;Tampering, unauthorized modification, software errors&lt;/td&gt;
&lt;td&gt;Hashing, digital signatures, certificates, change control&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Availability&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Authorized users can access resources when needed&lt;/td&gt;
&lt;td&gt;DoS/DDoS, hardware failure, natural disasters&lt;/td&gt;
&lt;td&gt;Redundancy, fault tolerance, patching, backups&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ogc3421whv2xvc4kmjg.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ogc3421whv2xvc4kmjg.jpg" alt="The CIA Triad" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Image context:&lt;/strong&gt; The triangle shows that Confidentiality, Integrity, and Availability are interdependent — a breach of any one vertex weakens the entire structure, and every security control maps to at least one of the three sides.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h3&gt;
  
  
  Confidentiality
&lt;/h3&gt;

&lt;p&gt;Confidentiality is the principle of keeping information and communications private and protected from unauthorized access. It applies to data at rest (stored files, databases), data in transit (network traffic, email), and data in use (active processing).&lt;/p&gt;

&lt;p&gt;Examples of information requiring confidentiality: trade secrets, personnel and health records, tax documents, military intelligence, attorney-client communications, financial account data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Methods to enforce confidentiality:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt; converts readable data into ciphertext accessible only with the correct decryption key. Without the key, intercepted data is computationally unreadable. Encryption protects confidentiality both in transit (TLS for network traffic) and at rest (full-disk encryption for stored data).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Access controls&lt;/strong&gt; enforce who can reach what data. Role-based access control (RBAC) assigns permissions based on job function rather than individual identity — a payroll employee can access salary data; a developer in a different department cannot. Authentication mechanisms — passwords, biometrics, MFA — enforce access controls at the entry point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steganography&lt;/strong&gt; hides the existence of information within ordinary-looking files rather than encrypting it. A secret message embedded in image pixel data is invisible to anyone who does not know to look for it. Unlike encryption, which signals that protected content exists, steganography provides plausible deniability that protected content exists at all.&lt;/p&gt;




&lt;h3&gt;
  
  
  Integrity
&lt;/h3&gt;

&lt;p&gt;Integrity is the principle of maintaining the accuracy and trustworthiness of data by protecting it from unauthorized modification or errors. Both malicious tampering and accidental corruption violate integrity.&lt;/p&gt;

&lt;p&gt;A direct illustration: if student test scores on a school server are altered by an attacker — changing grades, modifying records — the integrity of the data is compromised. The data exists and is accessible (confidentiality is intact, availability is intact) but it cannot be trusted because it no longer accurately reflects reality.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Methods to enforce integrity:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hashing&lt;/strong&gt; generates a fixed-length fingerprint (hash value) of data. Any change to the data — even a single bit — produces a completely different hash. By storing the original hash and recomputing it later, the system can detect whether data has been modified. MD5 and SHA-256 are common hashing algorithms; SHA-256 is preferred for security use.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Digital signatures&lt;/strong&gt; combine hashing with asymmetric cryptography: the sender hashes the data and encrypts that hash with their private key. The recipient decrypts the hash with the sender's public key and recomputes the hash themselves. If they match, the data has not been altered and the sender is authenticated. Digital signatures enforce both integrity and non-repudiation simultaneously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Certificates&lt;/strong&gt; are digital documents that validate the identity of websites, systems, or individuals using a trusted third-party (Certificate Authority). HTTPS certificates validate that a website is who it claims to be, preventing MITM attacks that could modify data in transit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Change control&lt;/strong&gt; is an administrative process for tracking, reviewing, and approving changes to systems and data. It ensures that modifications are authorized, tested, and documented — preventing both accidental damage and unauthorized tampering through process rather than cryptography.&lt;/p&gt;




&lt;h3&gt;
  
  
  Availability
&lt;/h3&gt;

&lt;p&gt;Availability is the principle of ensuring that authorized users can access systems, data, and resources when needed, without interruption. A system that is secure but unavailable fails its users as completely as one that has been breached.&lt;/p&gt;

&lt;p&gt;A high-stakes example: if the Federal Aviation Administration's air traffic control system becomes unavailable, radar data becomes inaccessible to controllers. The confidentiality and integrity of the data may be intact — but the failure to deliver it when needed could cause cascading consequences.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Methods to enforce availability:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Redundancy&lt;/strong&gt; deploys multiple systems, network paths, or data copies so that the failure of any single component does not cause service interruption. RAID storage, load-balanced server clusters, and geographically distributed datacenters are redundancy implementations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fault tolerance&lt;/strong&gt; designs systems to continue operating correctly in the presence of failures — hardware components that fail gracefully, automatic failover to backup systems, self-healing network paths. The goal is continuity of service regardless of individual component failures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Patching&lt;/strong&gt; maintains availability by fixing software vulnerabilities that attackers could exploit to crash services. Unpatched systems are both a confidentiality/integrity risk (exploitation) and an availability risk (denial of service via vulnerability exploitation).&lt;/p&gt;




&lt;h2&gt;
  
  
  Non-Repudiation
&lt;/h2&gt;

&lt;p&gt;Non-repudiation ensures that the sender of a message or data cannot later deny having sent it. It creates a verifiable record linking specific actions to specific identities.&lt;/p&gt;

&lt;p&gt;Non-repudiation matters in any context where accountability must be demonstrable: financial transactions, legal communications, healthcare records, regulatory compliance. "I never sent that email" is not a viable defense when a valid digital signature on the message proves otherwise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical mechanisms for non-repudiation:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Digital signatures&lt;/strong&gt; are the primary tool. When a user signs a document or message with their private key, that signature can only have been created by someone possessing that specific private key. Because private keys are kept secret and uniquely associated with an identity, the signature is non-repudiable proof of authorship.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Timestamps&lt;/strong&gt; from trusted time sources establish when a document or transaction occurred. Combined with a digital signature, a timestamp proves both who created something and when — critical for legal proceedings and audit trails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threats to non-repudiation&lt;/strong&gt; include phishing attacks that steal private keys, weak or compromised digital signatures, and shared credentials that prevent pinning actions to specific individuals. Non-repudiation fails completely if multiple users share a single account — the action can be attributed to the account but not to a specific person.&lt;/p&gt;




&lt;h2&gt;
  
  
  Identification, Authentication, and Authorization
&lt;/h2&gt;

&lt;p&gt;These three concepts form a sequential access control process. Each is distinct and must occur in order.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;IDENTIFICATION → AUTHENTICATION → AUTHORIZATION
"Who are you?"    "Prove it."       "What can you do?"
     ↓                 ↓                  ↓
 Username         Password + MFA    Role-based permissions
 Email address    Biometric scan    Resource access list
 Employee ID      Smart card        Privilege level
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Identification&lt;/strong&gt; links a unique identifier to a person or entity. A username, email address, or employee ID number identifies who is attempting access. Identification alone proves nothing — anyone can claim to be user123. It is the input to the authentication process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication&lt;/strong&gt; validates that the entity claiming an identity actually controls that identity. Providing the correct password for user123 authenticates that the person attempting access controls the credentials associated with that account. Authentication concentrates on verifying the right credentials are presented, not on what the authenticated user is permitted to do.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authorization&lt;/strong&gt; determines what the authenticated entity is permitted to access or do. Like a security guard checking a guest list or a ticket check at a cinema — your identity (ticket) grants access to a specific, defined scope (your assigned seat at this showing). Authorization is implemented through access control lists, role assignments, and permission matrices.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8qmzlo5sgl7popw7zq3n.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8qmzlo5sgl7popw7zq3n.jpg" alt="Identification → Authentication → Authorization" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Image context:&lt;/strong&gt; The three-step flow makes clear that these are sequential, not interchangeable — identification without authentication proves nothing, and authentication without authorization leaves access undefined.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Authentication Factors
&lt;/h2&gt;

&lt;p&gt;Authentication schemes are built on one or more of five distinct factor categories. &lt;strong&gt;Combining factors from different categories is what makes MFA effective&lt;/strong&gt; — using two factors from the same category (two passwords, two smart cards) does not meaningfully improve security.&lt;/p&gt;

&lt;p&gt;The five authentication factors with examples and primary use cases:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Factor&lt;/th&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Examples&lt;/th&gt;
&lt;th&gt;Strength&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Something you know&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Knowledge&lt;/td&gt;
&lt;td&gt;Passwords, PINs, security questions&lt;/td&gt;
&lt;td&gt;Low — can be stolen, guessed, phished&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Something you have&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Possession&lt;/td&gt;
&lt;td&gt;Smart cards, hardware tokens, authenticator apps&lt;/td&gt;
&lt;td&gt;Medium — requires physical theft&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Something you are&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Inherence&lt;/td&gt;
&lt;td&gt;Fingerprints, retina scans, facial recognition&lt;/td&gt;
&lt;td&gt;High — biologically unique, hard to replicate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Somewhere you are&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Location&lt;/td&gt;
&lt;td&gt;Approved IP ranges, GPS coordinates&lt;/td&gt;
&lt;td&gt;Medium — can be bypassed with VPN/proxy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Something you do&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Behavior&lt;/td&gt;
&lt;td&gt;Keystroke patterns, signature dynamics&lt;/td&gt;
&lt;td&gt;Medium — behavioral variation creates false negatives&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1nfo5kdolfgmr5s4g94k.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1nfo5kdolfgmr5s4g94k.jpg" alt="Five Authentication Factors" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Image context:&lt;/strong&gt; The five-row layout shows all authentication factor categories with their relative standalone strength, making it immediately clear why combining different factor types (MFA) dramatically raises security compared to any single factor alone.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Passwords
&lt;/h3&gt;

&lt;p&gt;Passwords are the most widely deployed authentication mechanism and the weakest in isolation. Username and password combinations are compared against stored credentials — if they match, access is granted. The fundamental weakness: passwords can be guessed, phished, intercepted over unencrypted connections, or stolen from breached databases. Password managers and long, unique passphrases address the guessing and reuse vectors; MFA addresses the theft vector.&lt;/p&gt;

&lt;h3&gt;
  
  
  Tokens
&lt;/h3&gt;

&lt;p&gt;Tokens are objects that store authentication information — physical (smart cards, hardware keys) or virtual (time-based one-time passwords generated by authenticator apps). A hardware token that generates a 6-digit code every 30 seconds provides possession-based authentication: even if an attacker steals the password, they cannot authenticate without the physical device generating the current code.&lt;/p&gt;

&lt;h3&gt;
  
  
  Smart Cards
&lt;/h3&gt;

&lt;p&gt;Smart cards are plastic cards with embedded computer chips storing authentication data — PINs, certificates, and identity information. The US Department of Defense Common Access Card (CAC) is the most widely known implementation, used by military personnel, contractors, and government employees for both physical and digital access. Smart cards, CACs, and similar physical tokens fall under the &lt;strong&gt;Personal Identity Verification (PIV)&lt;/strong&gt; standard for identity verification in government contexts.&lt;/p&gt;

&lt;h3&gt;
  
  
  Biometrics
&lt;/h3&gt;

&lt;p&gt;Biometrics authenticate using uniquely individual physical characteristics — attributes that cannot be forgotten (unlike passwords) or easily shared (unlike tokens).&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Biometric Type&lt;/th&gt;
&lt;th&gt;What It Scans&lt;/th&gt;
&lt;th&gt;Primary Use Case&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Fingerprint&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Ridge and valley patterns on fingertip&lt;/td&gt;
&lt;td&gt;Smartphones, building access, laptops&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Retinal&lt;/td&gt;
&lt;td&gt;Blood vessel patterns at the back of the eye&lt;/td&gt;
&lt;td&gt;High-security facility access&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hand geometry&lt;/td&gt;
&lt;td&gt;Size and shape of the hand&lt;/td&gt;
&lt;td&gt;Time-and-attendance systems&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Facial recognition&lt;/td&gt;
&lt;td&gt;Facial geometry and features&lt;/td&gt;
&lt;td&gt;Device unlock, surveillance, border control&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Voice recognition&lt;/td&gt;
&lt;td&gt;Unique vocal pattern characteristics&lt;/td&gt;
&lt;td&gt;Phone-based authentication, call centers&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Biometrics are high-assurance authentication but carry unique risks: biometric data cannot be changed if compromised. A stolen password can be reset. A compromised fingerprint template is compromised permanently.&lt;/p&gt;

&lt;h3&gt;
  
  
  Geolocation Authentication
&lt;/h3&gt;

&lt;p&gt;Geolocation adds a location constraint to authentication — verifying not just who the user is, but where they are attempting to access from. A corporate network may grant full access from approved office IP ranges, restricted access from home IP addresses, and deny access entirely from unexpected foreign IP addresses.&lt;/p&gt;

&lt;p&gt;Implementation methods: IP address lookup, GPS coordinates from mobile devices, Wi-Fi positioning, and RFID-based location tracking. Multi-site organizations use geolocation to enforce campus- or floor-level access restrictions — a user's credentials may authenticate successfully, but authorization is limited to the resources appropriate for their physical location.&lt;/p&gt;

&lt;h3&gt;
  
  
  Keystroke Authentication
&lt;/h3&gt;

&lt;p&gt;Keystroke authentication analyzes typing patterns rather than typed content — the timing and rhythm of keystrokes, dwell time on individual keys, and flight time between key presses. Every person types differently, and these patterns are measurably consistent enough to serve as a behavioral biometric.&lt;/p&gt;

&lt;p&gt;A keystroke logger captures these timing measurements and feeds them into algorithms that build a "primary keystroke pattern" for each user. Subsequent login attempts are compared against this baseline — significant deviations trigger additional authentication challenges. Keystroke authentication is typically used as a continuous or secondary authentication factor rather than a primary one.&lt;/p&gt;




&lt;h2&gt;
  
  
  Multi-Factor Authentication (MFA)
&lt;/h2&gt;

&lt;p&gt;MFA requires validating two or more factors from different categories before granting access.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3dv5rem4e2zomergl8np.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3dv5rem4e2zomergl8np.jpg" alt="MFA Factor Combinations" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Image context:&lt;/strong&gt; The table shows why factor combination matters — SMS-based MFA sits at Medium despite being "two factors" because of the SIM swap vulnerability, while hardware-based combinations reach High or Very High by combining genuinely different factor categories.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Critical rule:&lt;/strong&gt; the factors must be from different categories. Using two passwords (both "something you know") is not MFA — it provides no meaningful additional security. Using a password (something you know) combined with a hardware token code (something you have) is MFA — stealing the password alone is insufficient.&lt;/p&gt;

&lt;p&gt;Common MFA combinations and their relative security:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;MFA Combination&lt;/th&gt;
&lt;th&gt;Factors Used&lt;/th&gt;
&lt;th&gt;Security Level&lt;/th&gt;
&lt;th&gt;Primary Vulnerability&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Password + Hardware Token&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Know + Have&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;td&gt;Physical token theft&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Password + Authenticator App&lt;/td&gt;
&lt;td&gt;Know + Have&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;td&gt;SIM swap, phishing proxy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Password + SMS Code&lt;/td&gt;
&lt;td&gt;Know + Have&lt;/td&gt;
&lt;td&gt;Medium&lt;/td&gt;
&lt;td&gt;SIM swapping, SS7 attacks&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Password + Fingerprint&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Know + Are&lt;/td&gt;
&lt;td&gt;Very High&lt;/td&gt;
&lt;td&gt;Biometric spoofing (difficult)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Smart Card + PIN&lt;/td&gt;
&lt;td&gt;Have + Know&lt;/td&gt;
&lt;td&gt;High&lt;/td&gt;
&lt;td&gt;Card theft + PIN observation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Password + Geolocation&lt;/td&gt;
&lt;td&gt;Know + Where&lt;/td&gt;
&lt;td&gt;Medium&lt;/td&gt;
&lt;td&gt;VPN bypass&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;SMS-based MFA (receiving a code via text message) is the weakest MFA form — SIM swapping allows attackers to redirect SMS messages to their own device. Authenticator apps (TOTP) and hardware tokens are significantly more resistant. FIDO2 hardware keys (YubiKey) are the strongest available consumer MFA implementation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chip debit cards&lt;/strong&gt; are a real-world MFA example many people use daily: the chip (something you have) combined with a PIN (something you know) makes the card alone insufficient for transaction authorization.&lt;/p&gt;




&lt;h2&gt;
  
  
  Common Mistakes
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Treating authentication as sufficient without authorization.&lt;/strong&gt; Authenticating a user proves who they are — it does not determine what they should access. Without proper authorization controls and least-privilege principles, an authenticated user may reach data and systems far beyond what their role requires. Many breaches involve valid credentials accessing systems the user had no legitimate reason to access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using the same factor type twice and calling it MFA.&lt;/strong&gt; A smart card plus a USB security key is two "something you have" factors — it is not MFA. MFA requires factors from different categories. Organizations implementing MFA solutions should verify that their implementation combines genuinely different factor categories, not just multiple instances of the same category.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Relying on availability through redundancy without testing failover.&lt;/strong&gt; Redundant systems that have never been tested may not actually fail over correctly when needed. Backup systems with untested restoration procedures may not restore correctly. Availability controls require regular testing — scheduled failover drills, documented recovery time objectives, and verified restoration from backup — not just the installation of redundant hardware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Assuming non-repudiation from shared accounts.&lt;/strong&gt; Non-repudiation requires that actions can be attributed to a specific individual. Shared service accounts, shared administrative credentials, and generic login accounts make non-repudiation impossible — the action can be attributed to the account, but any of a dozen people might have used it. Individual accounts, individual credentials, and comprehensive audit logging are prerequisites for meaningful non-repudiation.&lt;/p&gt;




&lt;h2&gt;
  
  
  Frequently Asked Questions
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What is the CIA Triad and why does it matter?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The CIA Triad — Confidentiality, Integrity, and Availability — defines the three properties that must be protected for any asset to be considered secure. Confidentiality ensures only authorized parties access information. Integrity ensures data is accurate and unmodified. Availability ensures authorized users can access resources when needed. Every security control maps to one or more of these three properties, making the triad the universal framework for evaluating whether a defense addresses the actual threat.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What is the difference between authentication and authorization?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Authentication verifies identity — it answers "who are you?" by validating credentials such as passwords, biometrics, or tokens. Authorization determines access — it answers "what are you allowed to do?" by checking permissions, roles, and access control lists. Authentication must occur before authorization. Proving identity is the prerequisite for the system to determine what that identity is permitted to access.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What are the five authentication factors?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The five authentication factors are: Something you know (passwords, PINs), Something you have (smart cards, hardware tokens, authenticator apps), Something you are (biometrics — fingerprints, retina scans), Somewhere you are (geolocation — approved IP or GPS coordinates), and Something you do (behavioral biometrics — keystroke patterns). Multi-factor authentication combines two or more factors from different categories to significantly raise the bar for unauthorized access.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Why is SMS-based MFA considered weaker than other MFA methods?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SMS-based MFA is vulnerable to SIM swapping — an attack where the attacker convinces a mobile carrier to transfer the victim's phone number to a SIM card they control. Once successful, SMS codes are delivered to the attacker instead. SS7 protocol vulnerabilities also allow interception at the carrier level. Authenticator apps (TOTP) and hardware security keys are substantially more resistant because they don't rely on phone numbers or carrier infrastructure.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What is non-repudiation and when is it required?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Non-repudiation ensures that the sender of a message or data cannot later deny having sent it — it provides verifiable, cryptographic proof linking actions to identities. Digital signatures and timestamps are the primary mechanisms. Non-repudiation is required in any context where accountability must be legally demonstrable: financial transactions, legal document signing, healthcare records, audit trails, and any environment where disputes about who authorized what action may arise.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What is the difference between biometrics and behavioral biometrics?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Biometrics authenticate using static physical characteristics — fingerprints, retina patterns, facial geometry — measured once and stored as a reference template. Behavioral biometrics authenticate using dynamic patterns generated by how a person interacts with a system — keystroke rhythm, mouse movement, gait analysis. Behavioral biometrics enable continuous authentication throughout a session, not just at login, but require careful tuning to balance security against false rejection rates for legitimate users.&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The CIA Triad provides the analytical lens for evaluating every security control: does it protect confidentiality, integrity, or availability? Authentication, authorization, and non-repudiation operationalize those principles in access control systems. Understanding which factor category an authentication method falls into — and why combining different categories matters for MFA — determines whether access controls are genuinely secure or merely performative.&lt;/p&gt;




&lt;h2&gt;
  
  
  Sources
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/800-63-3/sp800-63b.html" rel="noopener noreferrer"&gt;NIST SP 800-63B — Digital Identity Guidelines&lt;/a&gt; — NIST's authoritative standard for authentication strength and assurance levels&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://fidoalliance.org/" rel="noopener noreferrer"&gt;FIDO Alliance — Authentication Standards&lt;/a&gt; — Organization defining phishing-resistant authentication standards including FIDO2 and WebAuthn&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final" rel="noopener noreferrer"&gt;NIST SP 800-53 — Security and Privacy Controls&lt;/a&gt; — Comprehensive catalog of security controls including access control and identification categories&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html" rel="noopener noreferrer"&gt;OWASP — Authentication Cheat Sheet&lt;/a&gt; — Practical implementation guidance for authentication systems&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cisa.gov/MFA" rel="noopener noreferrer"&gt;CISA — More Than a Password (MFA Guidance)&lt;/a&gt; — Federal guidance on implementing multi-factor authentication effectively&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>beginners</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
