https://www.csoonline.com/article/3259505/authenti
Post# of 82672
(Effective Date: March 1, 2018)
Based on a risk assessment, effective controls must be implemented to protect against unauthorized access to non-public information or information systems. The controls may include multi-factor authentication (MFA) or risk-based authentication. In sum, MFA must be used when accessing internal networks from an external network, unless the CISO has provided written approval to use reasonably equivalent, or more secure, access controls.