NIS2 Art.21.2j: Multi-Factor Authentication and Secured Communications
What This Control Requires
The measures referred to in paragraph 1 shall include at least the following: (j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.
In Plain Language
Stolen credentials are still the number one way attackers get in. MFA is the single most effective countermeasure, and NIS2 calls it out by name rather than leaving it buried in access control requirements. Continuous authentication - where identity is verified throughout a session, not just at login - takes this a step further.
Beyond authentication, this control also requires secured communication channels for voice, video, and text. With remote working now standard and cross-border operations common, protecting sensitive discussions from interception is essential.
Emergency communication systems need special attention. When a crisis hits and your primary channels may be compromised, you need a secure fallback that the team can rely on to coordinate the response.
How to Implement
Roll out MFA across all critical access points. At minimum, mandate it for all remote access (VPN, remote desktop, cloud services), all privileged and administrative accounts, email access, systems handling sensitive or regulated data, and any internet-facing authentication.
Choose your MFA methods based on risk. Hardware security keys (FIDO2/WebAuthn) offer the strongest protection. Authenticator apps (TOTP/push notifications) are a solid second tier. Avoid SMS-based MFA where possible due to SIM-swapping risks, though it is still far better than passwords alone. For the best balance of security and usability, consider passwordless authentication using FIDO2 keys or platform authenticators.
For high-risk scenarios, evaluate continuous authentication solutions. These analyse behavioural patterns like typing rhythm, mouse movement, location, and device characteristics throughout a session to detect hijacking or unauthorised use. Particularly valuable for privileged access and remote work.
Secure internal communications by deploying encrypted messaging, voice, and video platforms. For routine business communications, enterprise platforms with encryption in transit may suffice. For sensitive matters like board discussions, M&A activity, or incident response, use platforms with end-to-end encryption.
Set up a dedicated emergency communication system that works independently of your primary infrastructure. This means an out-of-band channel separate from normal email and messaging, pre-distributed contact lists and credentials, backup methods (satellite phones, encrypted radio) for critical infrastructure entities, and regular testing.
Publish clear acceptable use policies for communication tools. Ban personal messaging apps for business communications involving sensitive information. Retain communication metadata and logs in line with your data retention policy.
Test your MFA implementations regularly, including bypass attempts and failover procedures for emergency communications.
Evidence Your Auditor Will Request
- MFA deployment records showing coverage across critical systems and users
- MFA policy defining where and how multi-factor authentication is required
- Inventory of approved secured communication tools and their configurations
- Emergency communication plan with designated backup channels
- Testing records for MFA and emergency communication systems
Common Mistakes
- MFA deployed for external access but not for internal privileged accounts
- SMS-based MFA used as the sole option without stronger alternatives available
- No secured communication channel for incident response coordination
- Emergency communication plan not tested or contact lists outdated
- Personal messaging apps used for business communications containing sensitive data
Related Controls Across Frameworks
Frequently Asked Questions
Is SMS-based MFA acceptable under NIS2?
What does 'continuous authentication' mean in practice?
Track NIS2 compliance in one place
AuditFront helps you manage every NIS2 control, collect evidence, and stay audit-ready.
Start Free Assessment