🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to implement adaptive, risk-based authentication to strengthen compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-2-3

Practical, step-by-step guidance for implementing adaptive, risk-based authentication (Control 2-2-3) to meet ECC 2:2024 compliance requirements in small and mid-sized organizations.

April 24, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Adaptive, risk-based authentication (RBA) is a core requirement of Essential Cybersecurity Controls (ECC – 2 : 2024), Control 2-2-3, because it enables organizations to apply stronger identity verification where risk is higher without imposing unnecessary friction for low-risk access; this post shows how to implement RBA in the Compliance Framework context with practical steps, technical details, and small-business examples.

Why Control 2-2-3 matters for your Compliance Framework program

Control 2-2-3 requires that authentication decisions be informed by contextual risk so that access to sensitive systems and data is dynamically protected. For Compliance Framework reporting and audits, you must demonstrate a documented policy, implemented controls (e.g., step-up authentication), and logging/monitoring that show the organization adapts authentication strength based on measurable risk signals — not just static rules. RBA reduces attack surface by making stolen credentials less useful while balancing usability for legitimate users.

Practical implementation steps specific to the Compliance Framework

1) Define risk categories, assets, and user profiles

Start by inventorying users (employees, contractors, partners, customers) and classifying assets and access types (admin consoles, HR/payroll, customer data, operational systems). Map each asset to sensitivity levels in your Compliance Framework documentation. Define user profiles (privileged vs standard) and assign initial authentication requirements. This mapping becomes the basis for RBA policies required by Control 2-2-3.

2) Select signals, scoring model, and thresholds

Choose signals you will use for risk scoring: IP reputation, geolocation, device posture (up-to-date OS, disk encryption), device fingerprint, time-of-day, unusual behavior (velocity, new application access), and failed auth history. Implement a simple scoring model (0–1000) where each signal contributes a weighted score; for example: known-bad IP = +600, new device = +200, anomalous time = +100, weak device posture = +300. Define thresholds tied to actions: 0–250 = allow with MFA type A, 251–600 = require step-up MFA (push approval or TOTP plus SSO re-auth), >600 = block or require FIDO2 + manual review. Capture these thresholds in Compliance Framework controls documentation and change control records.

3) Integrate with identity stack and applications

Implement RBA via your identity provider (IdP) or cloud IAM that supports OIDC/SAML risk hooks or risk engine APIs. Configure SSO policies to call the risk engine at authentication time and apply step-up decisions via OAuth/OIDC claims (e.g., require_acr for FIDO2). For legacy apps, place an identity-aware proxy (IAP) or CASB to centralize enforcement. Ensure the IdP logs risk decisions and MFA events to your SIEM for auditing and compliance evidence — include sample claims and correlation IDs in logs to trace each decision back to a Control 2-2-3 policy.

Real-world small business scenarios and examples

Example 1 — Small accounting firm: classify payroll and tax filing portals as high sensitivity. Configure RBA so any login from outside the country or from an unmanaged device triggers step-up to FIDO2 keys; allow staff on corporate devices to use TOTP. In practice, this reduces successful phishing of credentials because remote attempts require hardware-backed authentication. Example 2 — Retail store with cloud POS: treat POS admin consoles as privileged; any changes to pricing or payout settings require multi-factor step-up and device posture checks (endpoint anti-malware running, patch level) before changes are allowed. Document these controls and capture business approvals in your Compliance Framework evidence folder.

Technical details and integration tips

Implement device posture checks using MDM/endpoint management (e.g., Microsoft Intune, Jamf) and feed device certificates or signed JWTs into your IdP. Use OAuth/OIDC claims such as amr (authentication methods references) and acr (authentication context class reference) to communicate step-up requirements to relying parties. For risk engines, consider commercial solutions (Auth0/Okta risk engine, Azure AD Identity Protection) or open-source modules that expose REST APIs for risk scoring. Ensure time-synchronization (NTP) on all systems for reliable timestamping of events, and configure token lifetimes to allow re-evaluation of risk for long-lived sessions.

Compliance tips, monitoring, and the danger of non-implementation

Document your RBA policy, scoring model, and exception handling in the Compliance Framework control book and keep change logs for any tuning. Configure SIEM alerts for repeated high-risk auth attempts, step-up failures, and MFA bypass events; define KPIs such as percentage of high-risk logins, mean-time-to-block, and false-positive rates. The risk of not implementing RBA includes credential-based breaches, lateral movement into critical systems, failed audits, and regulatory fines — small businesses are especially exposed because a single compromised admin account can lead to severe financial and reputational harm.

Summary: To meet ECC 2-2-3 under the Compliance Framework, adopt a documented, signal-driven risk scoring approach integrated with your IdP/SSO, enforce step-up or blocking actions via modern authentication methods (FIDO2, strong MFA), log and monitor every decision, and tailor policies to user roles and asset sensitivity; by following the steps and examples above, small businesses can achieve compliance while keeping user friction low and security outcomes high.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes