CISSP · · 5 min read

Authentication Methods and Technologies: Something You Know, Have, and Are

Passwords alone are not enough. Learn authentication factors, MFA, biometrics, and FIDO2 so you can match authentication strength to real world risk.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Authentication Methods and Technologies: Something You Know, Have, and Are

Hook / Why this matters

Most modern breaches start with a valid login. Attackers do not need to exploit a buffer overflow if they can trick a user into handing over a password. Understanding authentication factors and technologies lets you raise the bar so that a stolen password is not enough to get in.

Core concept explained simply

Authentication answers a single question: "Are you really who you claim to be". It does this by requiring evidence from one or more of three factor types:

The strength of authentication depends on both the factor type and how it is implemented.

Passwords and knowledge based factors

Passwords remain the most common authentication method. For security, they need:

Traditional complexity rules like "mix upper, lower, number, symbol" matter less than length and uniqueness. Modern guidance favors longer passphrases and checking against known breached password lists.

Knowledge factors also include security questions and PINs. These are often weaker because answers can be guessed or researched.

Possession factors

Possession factors prove you have a specific device or token. Examples include:

For these to be strong, the token must be resistant to cloning, and the system must bind the token to the specific user.

Inherence factors and biometrics

Inherence factors rely on traits of the user, for example fingerprints, facial recognition, iris scans, or voice patterns.

Biometric systems are evaluated using:

Biometrics are convenient, but once compromised they cannot be changed. They are often used as one factor in multi factor schemes rather than as a standalone solution for high risk access.

Multi factor authentication

Multi factor authentication combines two or more factor types. The key is that they must be different types, not just multiple passwords.

Correct examples of true MFA:

Incorrect examples that are not true MFA:

Both of these use knowledge factors only.

One time passwords and delivery methods

One time passwords (OTPs) are codes valid for a short time or a single use. Common forms are:

Delivery matters for security

Modern authentication: FIDO2 and WebAuthn

FIDO2 and WebAuthn enable strong authentication without passwords. The user proves possession of a private key stored in secure hardware, such as a security key or device secure enclave.

Benefits include:

These technologies are increasingly used for high value accounts and administrative access.

Context aware and risk adaptive authentication

Authentication strength can adapt based on context, such as location, device health, time of day, or behavioral patterns. For example, a login from a known device during office hours might require only one factor, while a login from a new country might trigger mandatory MFA.

CISSP lens

For the CISSP, you need to:

Exam questions often describe a scenario and ask you to choose the most appropriate authentication method based on risk, usability, and cost. The best answer balances these factors rather than always selecting the strongest possible control.

Real world scenario

A financial services company allowed VPN access using a username and password only. Attackers obtained a dump of usernames and passwords from a third party breach and used credential stuffing to try those credentials against the VPN.

Several reused passwords worked. The attackers logged in, moved laterally, and accessed sensitive customer data before being detected.

In response, the company:

Subsequent credential stuffing attempts failed because stolen passwords alone no longer granted access.

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: A system uses a password plus a one time code sent by SMS as its second factor. The organization wants to reduce the risk of account takeover for administrators. What change provides the most effective improvement

Answer: Replace SMS based codes for administrators with a stronger possession factor, such as hardware security keys using FIDO2 or app based authenticators on managed devices. This reduces exposure to SIM swap and message interception while keeping multi factor authentication in place.

Read next

© 2025 Threat On The Wire. All rights reserved.