Preferably, your MFA implementation need to be as protected as achievable and expose the smallest attack surface, but this method can produce a new one point of failure.
As a single of your most crucial cybersecurity products and services, your MFA ought to be designed and executed with developed-in redundancy. This way, the failure of any one MFA ingredient does not result in a denial of support for all of your MFA customers.
At the same time, you really should usually architect MFA implementations to apply rules of privileged obtain administration: