WikiGlossaryAuthentication
Security

Authentication

Definition

Authentication is the process of verifying that a person, service, device, or system is who or what it claims to be before access is granted. In information security and GRC, authentication is a foundational control because most business systems rely on identity to protect accounts, applications, data, infrastructure, and administrative functions. Authentication can use something a user knows, such as a password or passphrase; something a user has, such as a hardware key, mobile authenticator, or certificate; or something a user is, such as a biometric factor. Strong authentication reduces the chance that stolen credentials, shared accounts, weak passwords, or unmanaged service accounts will lead to unauthorized access. For compliance programs, authentication is usually evaluated alongside access control, user provisioning, privileged access management, logging, monitoring, and periodic review. Effective authentication programs define clear requirements for employees, contractors, administrators, service accounts, remote access, production systems, and high-risk workflows, with evidence showing that controls are consistently implemented and reviewed.

Real-World Examples

Startup Enforces MFA for Admin Accounts

A SaaS startup requires multi-factor authentication for founders, engineers, and administrators who can access customer data or production systems.

Growing Company Uses SSO for Workforce Access

A growing company centralizes user authentication through a managed identity provider so employees use consistent login policies across business applications.

Enterprise Reviews Authentication Logs

An enterprise security team monitors failed login attempts, impossible travel events, and unusual authentication patterns to detect possible account compromise.

Infrastructure Team Secures Service Accounts

An infrastructure team replaces shared credentials with unique service accounts, rotated secrets, and certificate-based authentication for automated systems.

Authentication in information security is the process of verifying the identity of a user, device, application, or service before allowing access. It helps ensure that only trusted identities can interact with systems, data, and administrative functions.

Authentication is important for compliance because it supports accountability, access control, and protection of sensitive information. Auditors and assessors often look for proof that users are verified before access is granted and that stronger methods are used for higher-risk access.

Authentication verifies identity, while authorization determines what that verified identity is allowed to access or do. For example, a user may authenticate with a password and second factor, then authorization rules decide whether that user can view records, approve changes, or manage settings.

Common authentication methods include passwords, passphrases, multi-factor authentication, one-time codes, authenticator apps, hardware security keys, certificates, single sign-on, biometrics, and passwordless login. The right method depends on system sensitivity, user risk, and operational needs.

Multi-factor authentication requires two or more independent factors to verify identity. These factors often combine something the user knows, something the user has, or something the user is, making it harder for an attacker to gain access with a stolen password alone.

Organizations should require multi-factor authentication for privileged accounts, remote access, administrative consoles, systems containing sensitive data, financial workflows, developer tools, and other high-risk access paths. Many teams also expand it to all workforce accounts as a baseline security control.

Authentication controls reduce security risk by making it harder for attackers to use stolen, guessed, reused, or shared credentials. Strong authentication can limit account takeover, reduce unauthorized access, improve traceability, and support faster detection of suspicious login behavior.

Useful evidence may include authentication policies, identity provider settings, multi-factor enforcement reports, screenshots of login requirements, access logs, privileged account lists, exception records, service account inventories, and review records showing that authentication settings are monitored and maintained.

Authentication policies should be reviewed at least periodically and whenever major systems, access patterns, business risks, or security requirements change. High-risk environments may review authentication settings, exceptions, and privileged access more frequently.

Information Security & GRC requirements for authentication typically include defined login standards, strong password or passwordless controls, multi-factor authentication for high-risk access, unique user identities, secure service account handling, logging, exception management, and documented evidence that controls are operating.

VersionDateAuthorDescription
1.0.02026-05-06WatchDog GRC TeamInitial publication