🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure MFA and SSO to Satisfy Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-2-2: Practical Deployment Steps

Step-by-step guidance for small businesses to implement MFA and SSO to meet ECC 2-2-2, including configuration details, examples, and compliance evidence you can use for audits.

March 29, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, technical walkthrough for implementing Multi-Factor Authentication (MFA) and Single Sign-On (SSO) to meet the Essential Cybersecurity Controls (ECC – 2 : 2024), Control 2-2-2, focused on real-world steps small businesses can complete and document for compliance.

Understanding Control 2-2-2 and objectives

Control 2-2-2 of the Compliance Framework requires that user authentication be strengthened by using centralized SSO and MFA so that access decisions are consistent, auditable, and enforce the principle of least privilege; your implementation must demonstrate that authentication factors are applied for access to corporate resources, that SSO centralizes authentication, and that logs/policies exist to prove enforcement. Implementation Notes: capture configuration screenshots, policy definitions, conditional access rules, and authentication logs as compliance artifacts. Key Objectives include protection of privileged accounts, reduction of password reuse risk, and centralized lifecycle management of identities.

Step 1 — Scope, inventory and prioritization

Begin with an identity inventory: list all identity stores (Azure AD, Google Workspace, Okta, local AD), cloud apps (Office365, AWS, Slack, SaaS), and high-risk accounts (admins, finance, HR). For a small business example: a 50-person company using Microsoft 365, Slack and AWS should prioritize admin accounts (Azure/Office365 Global Admins, AWS root & IAM admins) and remote access services (VPN, RDP) for first-wave MFA and SSO. Create a simple spreadsheet that maps users -> groups -> apps -> required assurance level; this mapping becomes your compliance scope document.

Step 2 — Choose an IdP and configure SSO (technical details)

Select an IdP that supports SAML 2.0 or OIDC and SCIM for provisioning (examples: Azure AD, Okta, Google Workspace, JumpCloud). Key technical fields you will configure for SAML: Assertion Consumer Service (ACS) / Reply URL (e.g., https://login.contoso.com/saml/acs), Entity ID / Audience URI, NameID format (email or persistent), attribute mappings (email, givenName, surname, groups), and the x.509 signing certificate (upload certificate and validate fingerprint). For OIDC: register client_id, client_secret, set redirect_uris and allowed origins, and configure scopes (openid email profile). When integrating AWS: create a SAML provider (IAM) with the IdP metadata, then create IAM roles with trust relationships for SAML and map SAML attributes to role ARNs via the IdP (RoleSessionName and SAML:aud). Always enable signed assertions and verify time skew allowances (commonly ±5 minutes) and token lifetimes (recommend 1 hour for access tokens by default, shorter for high-risk roles).

Step 3 — Configure MFA policies and Conditional Access

Implement MFA at the IdP level and enforce conditional access rules to meet the control's intent. Technical choices: enable push-based MFA (Okta Verify / Microsoft Authenticator), TOTP apps as fallback, and prefer phishing-resistant methods such as FIDO2/WebAuthn (YubiKey or platform authenticators) for administrators. Create conditional access rules that require MFA for: all admin roles, access from untrusted networks, new device registrations, and service portals (SSO dashboard). Example conditional access logic: Require MFA if device is not compliant OR sign-in risk >= medium OR IP not in trusted range; block legacy authentication protocols (IMAP/POP/SMTP/Basic Auth) by policy. For Microsoft 365 you can use Conditional Access policies in Azure AD and disable Basic Authentication using Exchange Online Authentication policies (e.g., via ExchangeOnlineManagement module: Set-AuthenticationPolicy -AllowBasicAuthPop $false ...). Document the exact policy screens and rule names for audit evidence.

Step 4 — Provisioning, lifecycle, and break-glass accounts

Use SCIM to automate user provisioning and deprovisioning where supported: configure the SCIM base URL (e.g., https://idp.example.com/scim/v2/) and a provisioning bearer token at the application; map attributes for group membership and role assignments. For small businesses, ensure offboarding steps occur automatically: disabling SSO access should remove access to SaaS within minutes. Establish a ‘break-glass’ admin account with a hardware key stored in a secure physical location (company safe) and strict documented use-case and review cadence; log any use and rotate break-glass credentials after use. Include role mapping documentation and examples (e.g., Okta group “Finance-Admins” mapped to SSO app role “finance_admin”).

Step 5 — Logging, monitoring, testing and evidence collection

Centralize authentication logs into your SIEM (or cloud logging) and retain them per your Compliance Framework retention requirements (recommend at least 1 year for authentication events; adjust per policy). Capture success/failure rates, MFA challenge counts, and suspicious login patterns (impossible travel, multiple geos, repeated failures). Test thoroughly: pilot with a department, run phishing and MFA-bypass scenarios, and perform a tabletop to simulate account compromise. For audit evidence, collect policy exports, screenshots of SSO app settings (ACS URL, Entity ID), conditional access rule exports, SCIM provisioning logs, and aggregated sign-in logs showing MFA prompts and results.

Compliance tips, best practices and small-business scenarios

Practical tips: (1) Start with "protect the crown jewels": admins, finance, HR, and VPN; (2) Enforce MFA for all remote access and cloud apps, then expand; (3) Prefer phishing-resistant authentication for privileged users; (4) Block legacy auth and require modern auth; (5) Make SSO the primary authentication path so you can revoke access centrally. For a 50-employee company using Microsoft 365 + AWS + Slack: implement Azure AD as IdP, federate Slack and AWS with SAML, enable Azure Conditional Access for MFA, use SCIM to provision Slack, and create IAM SAML roles for AWS with least-privilege policies. Maintain a one-page compliance checklist and a folder with screen captures and logs for auditors.

Risk of not implementing Control 2-2-2

Failing to implement centralized SSO and MFA dramatically increases risk: credential compromise, lateral movement, data exfiltration, regulatory non-compliance and fines, and reputational harm. For small businesses, a single compromised cloud admin account can mean full access to email, financials, and customer data. Without centralized SSO you cannot reliably revoke access across systems during offboarding, which increases attack surface and audit failures under the Compliance Framework.

In summary, meeting ECC Control 2-2-2 requires a focused program: inventory identities, pick an IdP that supports SAML/OIDC and SCIM, enforce strong MFA (prefer phishing-resistant methods), apply conditional access policies, automate provisioning and deprovisioning, centralize logs for audit, and document everything. For small businesses, prioritize high-risk accounts, pilot your rollout, and keep clear evidence (policy exports, screenshots, and logs) to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes