The New Best Practice for Phishing-Resistant MFA

Keep track of current cybersecurity news and best practices by staying up to date with our blog

The shift from “MFA” to “phishing-resistant MFA”

“What counts as strong authentication?” has changed materially over the last few years. Attackers increasingly bypass traditional MFA using real-time phishing proxies, session token theft, SIM swapping, and “push fatigue” approval bombing. In response, modern guidance has converged on a clearer standard: phishing-resistant MFA—authentication methods that remain secure even when a user is tricked into visiting a fake site.

This isn’t just a vendor slogan. US federal guidance and standards work now explicitly emphasize phishing-resistant approaches, and NIST’s latest Digital Identity Guidelines (SP 800-63-4, finalized July 2025) reinforce that password-based authentication is not phishing-resistant and push organizations toward stronger authenticator options.


What is phishing-resistant MFA?

What is phishing-resistant MFA? Phishing-resistant MFA is authentication that cannot be successfully replayed or proxied by an attacker through a fake site or adversary-in-the-middle setup. Typically, this requires cryptographic authenticators that bind the login to the real service origin (the legitimate domain) and require user intent. The most widely deployed example is FIDO2/WebAuthn, commonly delivered to users today as passkeys.

Phishing-resistant MFA is not merely “two factors.” It’s a property of how the protocol and authenticator behave under phishing conditions—especially whether secrets can be typed, copied, intercepted, or approved out-of-context.


Why is passkeys important?

Why is passkeys important? Passkeys (built on FIDO2/WebAuthn) replace shared secrets with public-key cryptography, so there’s no password to steal and nothing meaningful for an attacker to replay. Because WebAuthn is origin-bound, a fake login page can’t successfully use the credential for the real site, which directly disrupts modern phishing kits and credential-stuffing campaigns.

In practical terms, passkeys help organizations reduce:

  • Credential theft and reuse (no password database value to crack/replay)

  • Real-time phishing proxy success rates (origin binding)

  • MFA fatigue attacks (user intent + stronger ceremony than “Approve”)

  • Helpdesk load from password resets (when designed with good recovery)

How does WebAuthn and FIDO2 work?

How does WebAuthn and FIDO2 work? WebAuthn is a web standard that lets a service authenticate a user with a cryptographic key pair, where the private key stays on the user’s device or hardware token. During sign-in, the service sends a challenge; the authenticator signs it only for the legitimate website origin. The server verifies the signature with the public key it registered earlier.

Key terms (defined at first mention):

  • Passkey: A user-friendly implementation of FIDO2/WebAuthn credentials, often backed by a device secure enclave/TPM and unlocked via biometrics/PIN.

  • FIDO2: A standards family including WebAuthn (browser-to-server) and CTAP (device-to-client) enabling phishing-resistant authentication.

  • Origin binding: A security property ensuring credentials work only for the intended domain, not a lookalike.

What are the risks of sticking with “legacy MFA”?

What are the risks of sticking with legacy MFA? Many common MFA methods (SMS codes, one-time codes, simple push approvals) can be phished, intercepted, or socially engineered—especially via real-time phishing proxy toolkits and SIM-swap attacks. This means an attacker can still gain access even when “MFA is enabled,” creating a false sense of safety and leaving high-value accounts exposed.

A useful mental model: if a user can type it (passwords, OTPs) or approve it with minimal context (push prompts), an attacker can often trick them into providing it at the wrong time, on the wrong site, or for the wrong session.


A quick comparison of authentication options

The table below is a practical way to explain the “why” to stakeholders:

Method Phishing-resistant? Common failure mode Where it still fits
Passwords No Credential theft, reuse, stuffing Legacy apps only; reduce exposure
SMS OTP No SIM swap, interception, phishing Low-risk consumer contexts (with caution)
TOTP app codes No Real-time phishing proxy Better than SMS; transitional step
Push “Approve” Usually no MFA fatigue / push bombing Add number-matching and risk checks
Passkeys (FIDO2/WebAuthn) Yes (by design) Poor recovery design; device/account loss Default for workforce + customers

CISA’s guidance explicitly calls out WebAuthn/FIDO as the widely available phishing-resistant approach and provides implementation considerations.


Deployment pattern: “Passkeys-first” without breaking your org

What are the best practices for deploying passkeys? The safest approach is to roll out passkeys in phases: start with a pilot, then prioritize high-risk users and critical apps, and finally make passkeys the default while keeping a controlled fallback. You should also design recovery, device onboarding, and logging from day one to avoid lockouts and blind spots.

A proven rollout sequence:

  1. Pick the first targets: admin consoles, email, VPN/SSO, finance tools, source control.

  2. Pilot with IT + security: validate flows, recovery, and exception handling.

  3. Expand to privileged users: admins, developers with production access, executives.

  4. Make passkeys the default for the workforce: keep transitional fallbacks time-boxed.

  5. Extend to customers (if applicable): offer passkeys as “recommended,” then “default.”

For US federal-aligned environments, the Phishing-Resistant Authenticator Playbook is a practical starting point for planning and controls.


Configuration techniques that make passkeys work well in the real world

Passkeys reduce entire classes of attacks—but only if the surrounding configuration is solid. The most common “own goals” are account recovery weaknesses, incomplete coverage, and inconsistent policy enforcement.

Policy and enforcement essentials

  • Require phishing-resistant MFA for privileged access. Align with Zero Trust objectives and “step-up” controls for sensitive actions.

  • Bind access to device posture where possible. Use managed device requirements for admin actions (EDR present, disk encrypted, compliant OS).

  • Use strong session controls. Shorter sessions for privileged apps, re-auth for critical operations, and token theft-resistant settings where available.

Recovery and lifecycle (where many deployments fail)

  • Design recovery as a security feature, not a helpdesk script. Weak recovery (email links, knowledge questions) can reintroduce phishing and takeover risk.

  • Support multiple authenticators per user. Encourage users to register more than one device or hardware key.

  • Have a “break-glass” path for true lockouts, with strong identity verification and auditability.

NIST’s SP 800-63-4 suite emphasizes risk-based controls and modern authentication requirements across identity, authenticators, and federation—use it as an anchor for internal policy language.


Real-world example: government implementation momentum

Why is phishing-resistant MFA important? Government and critical infrastructure environments are frequent targets for credential phishing and account takeover, so phishing-resistant MFA reduces systemic risk at scale. For example, CISA has documented successful implementations of FIDO-based authentication in federal contexts, illustrating practical deployment steps, stakeholder alignment, and operational impacts.

Even if you’re not a federal agency, these implementation patterns translate well to enterprises: prioritize high-impact systems, standardize on a small number of authenticators, and formalize exceptions.


Operational defenses: logging, detection, and incident response

Passkeys reduce phishing success—but you still need observability to detect:

  • Impossible travel / anomalous sign-ins

  • New device registrations

  • Risky recovery events

  • Privilege escalation after login

Minimum logging recommendations:

  • Authentication method used (passkey vs fallback)

  • Device registration and removal events

  • Recovery workflow triggers

  • Admin role activations and high-risk app access

Tie these logs to your SIEM and identity threat detection tooling, and create playbooks for “new authenticator added” and “fallback MFA used for privileged login.”


Common pitfalls and how to avoid them

What are the risks of deploying passkeys poorly? The biggest risks are (1) insecure fallback methods that attackers can phish instead, (2) weak account recovery that becomes the new takeover path, and (3) inconsistent enforcement that leaves critical apps on legacy auth. Avoid this by time-boxing fallbacks, hardening recovery, and using centralized SSO policies with continuous monitoring.

Pitfalls to watch:

  • Allowing SMS as a permanent fallback for admins

  • Letting “temporary exceptions” live forever

  • Not training helpdesk on secure recovery verification

  • Forgetting service accounts and automation identities (use workload identity patterns instead)

Future trend: from “passwordless” to “phishing-resistant-by-default”

You’ll increasingly see policies and audits move from “MFA required” to “phishing-resistant MFA required,” especially for high-value environments. Industry and public-sector guidance is already trending in that direction, and standards like NIST SP 800-63-4 provide a durable framework to justify internal mandates.

The strategic end state looks like:

  • Passkeys as the default for users

  • Strong device security + attestation where appropriate

  • Risk-based step-up for sensitive actions

  • Hardened recovery, with tight audit trails

  • Reduced reliance on shared secrets (passwords, OTPs)

Practical starter checklist

If you want an actionable “week one” plan:

  • Inventory apps and identify which are behind SSO vs standalone

  • Choose passkey-ready identity providers and pilot group

  • Define policy: who must use phishing-resistant MFA first (admins, execs, finance)

  • Implement secure recovery workflows and require multiple authenticators

  • Instrument logs for authenticator lifecycle + fallback usage

  • Set a deprecation timeline for SMS/OTP where feasible

What are the best practices for passkeys long-term? Treat passkeys as a program: keep coverage expanding, keep fallbacks shrinking, keep recovery hardened, and keep metrics visible (percent passkey adoption, fallback rate, recovery events, and takeover attempts). Organizations that operationalize these metrics sustain the security gains rather than plateauing after rollout.

Scroll to Top