1. National Institute of Standards and Technology (NIST). (2017). Special Publication 800-63B
Digital Identity Guidelines: Authentication and Lifecycle Management.
Section 5.1
"Authenticator and Verifier Requirements
" states: "Multi-factor authentication (MFA) requires at least two of the three factor types to be used for a successful authentication event." It defines these types as something you know
something you have
and something you are. This supports option C as the only true MFA implementation.
2. Amazon Web Services (AWS). (2023). Security best practices in IAM. AWS Identity and Access Management Documentation.
In the section "Require multi-factor authentication (MFA)
" the documentation states: "For extra security
we recommend that you require MFA for all IAM users... With MFA
users have a user name and password (the first factor—what they know)
and an authentication code from their AWS MFA device (the second factor—what they have)." This directly applies to securing a cloud portal.
3. Rivest
R. L. (2014). Lecture 15: Authentication. MIT OpenCourseWare
6.857 Computer and Network Security.
The lecture notes discuss authentication methods
highlighting that passwords ("what you know") can be stolen. It introduces two-factor authentication as a solution combining passwords with a token ("what you have") to mitigate this risk
directly aligning with the logic in option C.