essential-eightmfaphishing-resistantfido2australiacompliancesecurity

Phishing-Resistant MFA: What It Means and Why Essential Eight ML2 Demands It

SMS codes and authenticator apps no longer meet Essential Eight Maturity Level 2. Here's what phishing-resistant MFA actually is, which methods qualify, and how to roll it out with FIDO2 security keys, Windows Hello for Business, or passkeys.

Robbie Cronin
Robbie Cronin
·14 min read

Your MFA is on. Every account has it. You checked the box on the insurer's questionnaire. So why is your assessor telling you it doesn't meet Maturity Level 2?

Because the rules changed. In November 2023, the ASD updated the Essential Eight maturity model and rewrote the MFA requirements. The big shift: ML2 now requires phishing-resistant MFA. Not "any MFA." Not authenticator apps. Not push notifications. Phishing-resistant specifically.

For most Australian businesses, this is the single most disruptive change in the entire update. The MFA you deployed two years ago probably doesn't qualify anymore.

Here's what changed, what counts, and how to fix it.

What "Phishing-Resistant" Actually Means

Start with the problem it solves.

Traditional MFA methods (SMS codes, TOTP apps, push notifications) all share the same weakness. They rely on the user sending a secret over the network. A code, a tap, an approval. If an attacker can trick the user into entering that secret on a fake site, the attacker gets in.

This is called an adversary-in-the-middle attack. It works like this:

How an Adversary-in-the-Middle Attack Bypasses MFA

1Attacker sends phishing email with link to fake login page
The page looks identical to the real thing
2User enters password on fake page. Attacker relays it to real site.
Real-time proxy, not a static fake
3Real site sends MFA challenge. Attacker relays it back to user.
User sees a normal MFA prompt
4User approves MFA (enters code or taps 'approve'). Attacker captures session token.

The attacker sits between the user and the real login page, relaying everything in real time. The user thinks they're logging into the real site. The attacker captures the session token after MFA completes. MFA was never bypassed. It was completed, just not by the right person.

147%
Increase in adversary-in-the-middle phishing attacks from 2023 to 2025
Canadian Centre for Cyber Security tracking data. By early 2025, nearly 100% of observed AitM phishing campaigns used real-time proxy tools like Evilginx rather than static credential harvesting pages.

Phishing-resistant MFA stops this. It uses cryptographic proof that's bound to the real website's domain. The authentication can't be relayed through a proxy because the security key or device checks the domain it's talking to. A fake site gets nothing usable, even if the user clicks the phishing link.

That's the difference. Traditional MFA protects against stolen passwords. Phishing-resistant MFA protects against stolen passwords and real-time phishing attacks.

What Counts as Phishing-Resistant (and What Doesn't)

The ASD's wording is straightforward: "Multi-factor authentication used for authenticating users of systems is phishing-resistant." But they don't list specific products. So here's how it maps to real-world options.

Methods That ARE Phishing-Resistant

FIDO2 security keys. Physical hardware tokens (YubiKey, Feitian, Token2) that use public key cryptography. The private key never leaves the device. Authentication is bound to the domain, so phishing proxies can't intercept it. This is the gold standard.

Windows Hello for Business. Uses the TPM chip built into your laptop or desktop for cryptographic authentication. Biometric (face or fingerprint) or PIN, backed by hardware-bound keys. Free if your devices have TPM 2.0. Requires Intune for deployment.

Passkeys (device-bound). The consumer-friendly evolution of FIDO2. Same cryptographic foundation. Supported by Entra ID as of 2024. Device-bound passkeys (stored in the device's TPM or secure element) are phishing-resistant. Synced passkeys (backed up to iCloud or Google) are still debated for enterprise use.

Certificate-based authentication (smart cards). The oldest phishing-resistant method. Common in government and defence. Higher management overhead than FIDO2.

Methods That Are NOT Phishing-Resistant

SMS codes. Not phishing-resistant. Also no longer meets ML1 (SMS doesn't satisfy the "something you have" requirement since SIMs can be swapped and ported).

Voice calls. Same problem as SMS. Interceptable. Not phishing-resistant.

TOTP authenticator apps. The six-digit codes from apps like Authenticator or Google Authenticator. These meet ML1 but not ML2. The code can be entered on a phishing proxy just like a password.

Push notifications (even with number matching). This is the one that catches people. Number matching adds friction, but it doesn't add cryptographic domain binding. The user can still approve a push on a proxy site. Meets ML1. Does not meet ML2.

Push Notifications with Number Matching: Not Enough for ML2

This is the most common misconception. Many businesses deployed number matching in 2023-2024 thinking it was phishing-resistant. It's a meaningful improvement over basic push (it stops fatigue attacks), but it doesn't cryptographically bind to the domain. Under Essential Eight ML2, it doesn't qualify.

MFA Methods Compared

MFA Methods: What Meets Which Maturity Level

FeaturePhishing-Resistant (ML2+)Non-Resistant (ML1 max)
FIDO2 security key (YubiKey, etc.)
Yes. Gold standard.
Windows Hello for Business
Yes. Free with TPM 2.0 hardware.
Device-bound passkeys
Yes. Emerging option in Entra ID.
Smart cards / CBA
Yes. Government/defence standard.
Authenticator app (TOTP)
ML1 only. Code can be phished.
Push notification (no number match)
ML1 only. Vulnerable to fatigue attacks.
Push notification (with number match)
ML1 only. Better, but not cryptographically bound.
SMS / voice call
Does not meet any maturity level.

Essential Eight MFA Requirements by Maturity Level

The November 2023 update restructured MFA requirements across all three levels. Here's what each requires.

Maturity Level 1: MFA must use "something users have" and "something users know" (or something users have unlocked by something they know or are). Authenticator apps, TOTP, and push notifications with number matching all qualify. SMS does not. The emphasis is on having real two-factor authentication, not just a password plus a security question.

Maturity Level 2: MFA must be phishing-resistant. Full stop. That means FIDO2 security keys, Windows Hello for Business, passkeys, or certificate-based authentication. Users must also authenticate to their workstations using phishing-resistant MFA. All successful and unsuccessful MFA events must be centrally logged.

Maturity Level 3: Same phishing-resistant requirement as ML2, but universally enforced with no exceptions. Includes verification that MFA can't be bypassed through legacy protocols or fallback methods.

The jump from ML1 to ML2 is the biggest shift. It's not just "better MFA." It's a fundamentally different technology.

For a full breakdown of all eight controls across maturity levels, see the Essential Eight Maturity Levels guide.

How to Roll It Out

The good news: if you're running Entra ID (which most Australian M365 businesses are), the tooling exists. The challenge is planning and sequencing.

Phishing-Resistant MFA Rollout

1Audit current MFA methods and identify gaps
Week 1. Pull Entra ID sign-in logs.
2Choose your primary method: Windows Hello or FIDO2 keys
Week 1-2. Depends on hardware and workforce.
3Pilot with IT and admin accounts first
Week 2-4. Admins should be first, not last.
4Create Conditional Access policy in report-only mode
Week 3-5. Use 'Phishing-resistant MFA' authentication strength.
5Distribute security keys or enrol Windows Hello
Week 4-8. Include backup keys for FIDO2 users.
6Switch Conditional Access to enforce mode
Week 6-10. Start with admins, expand to all users.
7Disable legacy MFA methods for ML2-scoped apps

Key Implementation Details

Conditional Access authentication strengths. Entra ID has a built-in "Phishing-resistant MFA" authentication strength policy. You don't need to build a custom one. Create a Conditional Access policy, set the grant control to "Require authentication strength," and select the phishing-resistant option. This blocks any non-qualifying MFA method.

Start with privileged accounts. Admin accounts are the highest-risk target. Roll out phishing-resistant MFA to global admins, security admins, and any account with elevated privileges first. This is also an explicit ML2 requirement for restricting administrative privileges.

Windows Hello for Business via Intune. If your devices have TPM 2.0 (most hardware from 2018 onwards does), you can deploy Windows Hello for Business through Intune policies at no extra hardware cost. Users enrol with a biometric or PIN backed by the TPM. Check your fleet with the Get-Tpm PowerShell command.

FIDO2 security keys for shared devices and remote workers. Windows Hello is device-bound, which means it only works on the enrolled device. For shared workstations, kiosks, or staff who move between devices, FIDO2 security keys are the better option. Order two keys per user (one primary, one backup stored securely).

Break-glass accounts. Always exclude at least one emergency access account from your Conditional Access policy. If every admin gets locked out because keys are lost or Windows Hello fails, you need a way back in. Store the break-glass credentials in a physical safe, not a password manager that requires the MFA you just locked everyone out of.

The Cost Breakdown

Cost of Phishing-Resistant MFA (50-Person Business)

FeatureWindows Hello for BusinessFIDO2 Security Keys
Hardware cost
$0 (if TPM 2.0 present)
$5,000-$10,000 (2 keys per user at $50-$100 each)
Entra ID licence required
P1 (included in Business Premium)
P1 (included in Business Premium)
Intune required
Yes (included in Business Premium)
No (but recommended for policy management)
Works on shared devices
No (device-bound)
Yes
Works for remote staff
Only on enrolled device
Yes, any device with USB or NFC
User training effort
Low (familiar biometric flow)
Medium (new physical token workflow)
Backup/recovery plan
Temporary Access Pass or backup key
Second registered key per user

Security key pricing in Australia: A YubiKey 5 NFC (USB-A + NFC) runs about $90-$100 AUD from local retailers like Scorptec or Trust Panda. The YubiKey 5C NFC (USB-C + NFC) is slightly more. Budget two keys per person: one to carry, one stored as backup.

The cheapest path: For a business where everyone has their own laptop with TPM 2.0, Windows Hello for Business is effectively free. You're already paying for Business Premium (which includes Entra ID P1 and Intune). The only cost is the IT time to configure and deploy it.

The practical path for most: A mix. Windows Hello for staff on assigned devices. FIDO2 keys for admins, shared devices, and anyone who works across multiple machines.

Common Mistakes

Thinking Authenticator app push is phishing-resistant

The most widespread mistake. Many businesses deployed Authenticator with number matching in 2023-2024 and assumed they met ML2. Number matching is better than basic push, but it doesn't satisfy the phishing-resistant requirement. You need to either add FIDO2 keys or Windows Hello on top of what you have.

Starting with regular users instead of admins

Admins should be the first group on phishing-resistant MFA, not the last. They have the most access and are the highest-value target. The ML2 requirement for restricting administrative privileges explicitly calls for stronger authentication on privileged accounts.

No fallback plan

What happens when someone loses their security key? Or their laptop TPM fails? Without a backup method or process, you're choosing between security and productivity. Register two FIDO2 keys per user. Configure Temporary Access Pass in Entra ID as a time-limited recovery method. Document the process before you need it.

Forgetting workstation sign-in

ML2 doesn't just require phishing-resistant MFA for cloud services. It also requires phishing-resistant MFA for authenticating to workstations. Windows Hello for Business covers this natively. If you're using FIDO2 keys for cloud apps but still signing into Windows with a password, you have a gap.

Not logging MFA events

ML2 requires all successful and unsuccessful MFA events to be centrally logged and protected from modification. If you're enforcing phishing-resistant MFA but not collecting the logs, you're not compliant. Entra ID sign-in logs cover this, but they need to be exported to a central log store (Log Analytics or a SIEM).

The Insurance Angle

Cyber insurers don't use the term "Essential Eight" on their questionnaires (usually). But they're asking the same questions.

"Do you require multi-factor authentication for all remote access?" Yes. "Is your MFA resistant to phishing attacks?" This is the question that trips people up. If you're using push notifications, the honest answer is no.

Insurers who scan your environment before quoting will see your Entra ID configuration. If Conditional Access allows non-phishing-resistant methods, that shows up. If you claimed phishing-resistant MFA on the application and your environment says otherwise, that's a problem at claims time.

Getting phishing-resistant MFA right doesn't just tick the Essential Eight box. It directly strengthens your insurance posture. For more on how Essential Eight maps to cyber insurance requirements, see the full insurance guide.

Do You Need Phishing-Resistant MFA Right Now?

Is Phishing-Resistant MFA a Priority for You?

Are you targeting Essential Eight Maturity Level 2?

3 questionsQuestion 1 of 3

Where to Start

Three things you can do this week:

  1. Check your current MFA methods. Pull the Entra ID sign-in logs and look at what authentication methods are actually being used. You might be surprised how many accounts are still on SMS or basic push.

  2. Check your hardware. Run Get-Tpm on a sample of devices. If TPM 2.0 is present (it will be on most hardware from 2018+), Windows Hello for Business is your lowest-cost path to compliance.

  3. Start with admins. Even before you roll out to all users, get your admin accounts on FIDO2 keys or Windows Hello. This covers the highest-risk accounts first and gives your IT team hands-on experience before the wider rollout.

For a broader view of where your organisation sits across all eight controls, the Essential Eight overview covers the full framework.

Check Your MFA Posture

The Innitor compliance scorecard includes MFA questions mapped to Essential Eight maturity levels. Five minutes, no email required. If you're relying on SMS or push notifications and aiming for ML2, the scorecard will flag it.

Get posts like this in your inbox

Practical takes on engineering, compliance, and building products that work. No spam, unsubscribe anytime.

Robbie Cronin

Robbie Cronin

Fractional CTO helping non-technical founders make better technical decisions. Based in Melbourne.

More about Robbie

Related articles