Why MFA Matters
MFA is consistently among the most effective controls against unauthorized access. It is also one of the first things auditors verify:| Framework | MFA Requirement |
|---|---|
| ISO 27001 | A.9.4.2 — Secure log-on procedures including multi-factor |
| SOC 2 | CC6.1 — Logical access security with multi-factor authentication |
| HIPAA | 164.312(d) — Person or entity authentication |
| GDPR | Article 32 — Appropriate technical and organizational measures |
| PCI-DSS | 8.3 — Secure all individual non-console administrative access with MFA |
Enabling MFA for Your Account
Each user can enable MFA from their personal account settings.Open account settings
Click your avatar or name in the top right corner and select Account Settings or Security.
Scan the QR code
Open your authenticator app (Google Authenticator, Authy, 1Password, or any TOTP-compatible app) and scan the QR code displayed on screen.
Enter the verification code
Type the 6-digit code from your authenticator app to verify the setup is working.
Supported Authenticator Apps
LowerPlane uses the Time-based One-Time Password (TOTP) standard, which is compatible with:- Google Authenticator (iOS, Android)
- Authy (iOS, Android, Desktop)
- 1Password (built-in TOTP support)
- Microsoft Authenticator (iOS, Android)
- Bitwarden (built-in TOTP support)
- Any other TOTP-compatible authenticator app
SMS-based MFA is not supported. TOTP authenticator apps are more secure than SMS, which is vulnerable to SIM-swapping and interception attacks.
Backup Codes
Backup codes are single-use codes that let you sign in when your authenticator app is unavailable:- LowerPlane generates a set of backup codes when you enable MFA.
- Each code can only be used once.
- You can regenerate a new set of codes at any time from your account settings (this invalidates the previous set).
- Use a backup code in place of the TOTP code during sign-in.
Organization-Wide MFA Enforcement
Admins and Owners can require MFA for all users in the organization.Set the grace period
Optionally set a grace period (e.g., 7 days) to give existing users time to set up MFA before enforcement takes effect.
- Users who have not enabled MFA will be required to set it up before accessing any other page.
- New users will be prompted to configure MFA during their first login.
- The enforcement cannot be bypassed by individual users.
Monitoring MFA Status
Admins can view MFA enrollment status for all users:- Go to Settings > Users.
- The user list includes a 2FA Status column showing whether each user has MFA enabled.
- Filter the list by MFA status to identify users who have not yet enrolled.
Resetting a User’s MFA
If a user loses access to their authenticator app and backup codes:- An admin navigates to Settings > Users.
- Find the affected user and click Reset MFA.
- Confirm the reset. The user’s MFA is disabled.
- The user must set up MFA again on their next login (immediately if enforcement is active).
MFA and Compliance Evidence
LowerPlane automatically generates evidence related to MFA:- MFA enrollment rate — Percentage of users with MFA enabled (target: 100%)
- MFA enforcement policy — Whether organization-wide enforcement is active
- MFA enrollment events — Timestamps of when each user enabled MFA
Best Practices
- Enforce MFA for all users without exception. A single account without MFA is a compliance gap.
- Use authenticator apps, not SMS. TOTP apps are more secure and are the industry-standard recommendation.
- Require backup codes to be saved. Remind users during onboarding to store backup codes securely.
- Combine MFA with SSO. When SSO is configured, MFA can be enforced at the identity provider level for an additional layer of security.
- Review MFA status in access reviews. Include MFA enrollment as a check in your quarterly access review process.