Off-Prem

PaaS + IaaS

Don't have MFA on a Google Cloud account? You'll have to from Jan

Lock it up. Lock it up


Google Cloud is the latest to take the decision away from customers and enforce the use of multi-factor authentication (MFA) for all users to improve the security of the minority that don't already have it enabled.

The company's phased approach has already begun but starting in January, the roughly 30 percent of Google Cloud customers that still rely on a password only for account authentication will be forced to enable an MFA solution.

For the next two months, Google Cloud will be pushing reminders about the impending change to MFA-less users, along with links to resources to make the rollout easier for organizations who need a little extra support.

"At Google Cloud, we're committed to providing the strongest security for our customers," the company blogged today. 

"As pioneers in bringing multi-factor authentication to millions of Google users worldwide, we've seen firsthand how it strengthens security without sacrificing a smooth and convenient online experience. That's why we will soon require MFA for all Google Cloud users who currently sign in with just a password."

The final phase of the rollout is slated to begin at the end of next year. After the password-only crowd, all customers who used federated authentication for Google Cloud will also be roped into enabling MFA.

There will, however, be some flexibility for these customers. Google Cloud said it's working with the major identity providers so that MFA can be enabled on their side and that will satisfy the company's new MFA requirements, or customers can choose to enable it on Google's side, whichever is the preferred option.

Google introduced consumer-grade 2FA for users in 2011 and since then has developed it further to phishing-resistant security keys, which latterly evolved into passkeys. 2FA isn't mandatory for consumer accounts, although Google said it's widely used, and Google Cloud customers are most likely hosting more sensitive data anyway, which necessitates greater security controls.

"Today, there is broad [two-step verification (2SV)] adoption by users across all Google services. However, given the sensitive nature of cloud deployments – and with phishing and stolen credentials remaining a top attack vector observed by our Mandiant Threat Intelligence team – we believe it's time to require 2SV for all users of Google Cloud.

"This shift is backed by strong evidence both from our own experience and from U.S. government agencies. The Cybersecurity and Infrastructure Security Agency (CISA) found that MFA makes users 99% less likely to be hacked, a powerful reason to make the switch."

Google Cloud's move follows that of Amazon which last week announced MFA as an account security option for WorkMail customers for the first time, eight years after the enterprise email service launched.

Its cloud arm, AWS, also announced over the summer its intention to force MFA on customers, but only for privileged accounts. The approach was similar to that of Microsoft, whose execs confirmed in May that its policy would only apply to Azure admins.

Snowflake said it too would be mandating MFA for all users in July, although this was essentially forced on the company after a swathe of account break-ins were attributed to users lacking the extra authentication security.

Regardless of the motivations behind the respective companies' decisions to enforce MFA on more customers, doing so is always a step forward in security. 

The prevailing advice from all corners of the infosec industry is to enable it as widely as possible – it's one of the most effective ways of preventing breaches.

It's something that should ideally be adopted across the wider industry and not just at the big tech companies given that cybercrims have targeted cloud customers on an increasing basis for years now, with researchers citing chunky year-on-year increases in targeting attempts. 

A report from PwC released in September found that cloud-based threats were at the very top of CISOs' list of fears mainly due to their organizations not being set up to defend against them – an even greater fear than ransomware for many.

Similarly, Microsoft's research into Storm-0501, a double trouble group which both breaches cloud environments and uses ransomware, showed that its methods could all be stifled heavily by enabling MFA. It serves as a case study showing how effective additional account controls can be for organizations defending against the most sophisticated cybercriminals. ®

Send us news
6 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Trump administration wants to go on cyber offensive against China

The US has never attacked Chinese critical infrastructure before, right?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren't; Polish spy boss arrested, and more

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

OpenWrt orders router firmware updates after supply chain attack scare

A couple of bugs lead to a potentially bad time

Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware

Threatened with life in prison, Kyiv charity worker gives middle finger to state spies