_private/qwestly-private-docs/SOC2/access-control/Authentication-SSO-MFA-Evidence.md

Authentication (SSO/MFA) Configuration - SOC2 Evidence

Document Version: 1.0
Date: July 25, 2025
Owner: Dominick Pham, CTO
Classification: Internal Use

Executive Summary

This document provides evidence of Qwestly's implementation of a comprehensive authentication strategy combining Single Sign-On (SSO) through Google Workspace and Multi-Factor Authentication (MFA) for systems that don't support SSO. Our hybrid approach ensures secure access to all business systems while maintaining user convenience and compliance with SOC2 requirements.

SOC2 Trust Services Criteria Addressed

Criteria Control Objective Implementation Status
CC6.1 Logical and physical access controls ✅ Implemented
CC6.2 System boundaries and data classification ✅ Implemented
CC6.3 Access control systems and procedures ✅ Implemented
CC7.1 System monitoring ✅ Implemented
CC7.2 Detection of security events ✅ Implemented

Authentication Strategy Overview

Primary Authentication Method: Google Workspace SSO

  • Coverage: All systems that support SAML/OAuth integration
  • Systems: Auth0, Supabase, LangSmith, Vercel, and other business applications
  • Benefits: Centralized identity management, reduced password fatigue, enhanced security

Secondary Authentication Method: MFA

  • Coverage: Systems that don't support SSO (e.g., personal GitHub accounts)
  • Implementation: TOTP-based MFA (Google Authenticator, 1Password, etc.)
  • Requirements: MFA mandatory for all business accounts

Detailed Implementation

1. Google Workspace SSO Configuration

Control Implementation:

  • Centralized identity provider through Google Workspace
  • SAML 2.0 and OAuth 2.0 integration with business applications
  • Automatic user provisioning and deprovisioning
  • Role-based access control through Google Groups

Technical Specifications:

SSO-Enabled Systems:
- Auth0 (SAML)
- Vercel (OAuth)
- LangSmith (OAuth)
- Slack (OAuth)
- Other business applications supporting SSO

MFA-Required Systems:
- Supabase (TOTP-based MFA)
- GitHub (personal accounts with work email)
- AWS Console (for privileged access)
- Password managers (1Password)
- Any system not supporting SSO

Security Measures:

  • Session Management: Configurable session timeouts
  • Access Logging: All SSO events logged in Google Workspace Admin Console
  • Account Security: Google Workspace security policies enforced
  • Device Management: Mobile device management for company accounts

Evidence Location:

  • Google Workspace Admin Console: SSO configuration and logs
  • Application-specific SSO settings
  • User provisioning documentation

2. Multi-Factor Authentication (MFA) Implementation

Control Implementation:

  • TOTP-based MFA for systems without SSO support
  • Backup codes provided for account recovery
  • MFA enrollment required during onboarding
  • Regular MFA status verification

Systems Requiring MFA:

- Supabase (TOTP-based MFA)
- GitHub (personal accounts with work email)
- AWS Console (for privileged access)
- Password managers (1Password)
- Any system not supporting SSO

MFA Enforcement:

  • Enrollment: Required within 24 hours of account creation
  • Verification: Quarterly MFA status reviews
  • Recovery: Backup codes stored securely
  • Monitoring: Failed MFA attempts logged and reviewed

Technical Configuration:

MFA Requirements:
  - TOTP app required (Google Authenticator, 1Password, etc.)
  - Backup codes generated and stored securely
  - MFA bypass not allowed for business accounts
  - Failed attempts trigger security alerts

3. Password Policy and Management

Control Implementation:

  • Strong password requirements for non-SSO systems
  • Password manager (1Password) for secure credential storage
  • Regular password reviews and updates
  • Account lockout policies

Password Requirements:

- Minimum 12 characters
- At least one uppercase letter
- At least one number
- No reuse of last 8 passwords
- Account lockout after 6 failed attempts
- Initial password change required on first login

Password Management:

  • Storage: 1Password for all business credentials
  • Sharing: Secure sharing through 1Password teams
  • Rotation: Quarterly password reviews
  • Recovery: Secure password reset procedures

4. Access Monitoring and Logging

Control Implementation:

  • Comprehensive logging of all authentication events
  • Real-time monitoring of suspicious activities
  • Regular review of access logs
  • Automated alerts for security events

Logged Events:

SSO Events:
- Successful/failed SSO logins
- User provisioning/deprovisioning
- Role changes and access modifications
- Session creation and termination

MFA Events:
- MFA enrollment and setup
- Successful/failed MFA attempts
- MFA bypass attempts
- Account lockouts

Password Events:
- Password changes and resets
- Failed login attempts
- Account lockouts
- Password policy violations

Monitoring and Alerting:

  • Real-time Alerts: Failed authentication attempts, suspicious logins
  • Daily Reviews: Authentication logs and security events
  • Weekly Reports: Access patterns and anomalies
  • Monthly Analysis: Trend analysis and security improvements

5. User Access Management

Control Implementation:

  • Role-based access control (RBAC)
  • Least privilege principle enforcement
  • Regular access reviews (quarterly)
  • Immediate access removal upon termination

Access Provisioning Process:

1. HR onboarding completion
2. Google Workspace account creation
3. SSO application access provisioning
4. MFA setup for non-SSO systems
5. Role-specific access assignment
6. Access documentation and tracking

Access Review Process:

  • Frequency: Quarterly reviews
  • Scope: All user accounts and permissions
  • Documentation: Review findings and actions taken
  • Remediation: Immediate removal of unnecessary access

Evidence Documentation

Screenshot Evidence Required

  1. Google Workspace SSO Configuration

    • Screenshot of SSO settings in Google Workspace Admin Console
    • Screenshot of SAML/OAuth application configurations
    • Screenshot of user provisioning settings
  2. MFA Configuration

    • Screenshot of MFA settings in supported applications
    • Screenshot of MFA enrollment process
    • Screenshot of backup code generation
  3. Access Control Settings

    • Screenshot of role-based access configurations
    • Screenshot of password policy settings
    • Screenshot of account lockout configurations
  4. Monitoring and Logging

    • Screenshot of authentication logs
    • Screenshot of security event monitoring
    • Screenshot of access review reports

Policy Documentation

Related Policies:

Key Policy Requirements:

  • MFA required for all business accounts
  • SSO preferred when available
  • Regular access reviews and monitoring
  • Immediate access removal upon termination
  • Strong password requirements for non-SSO systems

Testing and Validation

Control Testing Procedures

  1. SSO Functionality Testing

    • Verify SSO login works for all configured applications
    • Test user provisioning and deprovisioning
    • Validate role-based access assignments
    • Confirm session management and timeouts
  2. MFA Functionality Testing

    • Verify MFA enrollment process
    • Test MFA authentication flow
    • Validate backup code functionality
    • Confirm MFA bypass prevention
  3. Password Policy Testing

    • Verify password strength requirements
    • Test account lockout functionality
    • Validate password history enforcement
    • Confirm secure password reset process
  4. Monitoring and Alerting Testing

    • Verify authentication event logging
    • Test security alert generation
    • Validate access review processes
    • Confirm incident response procedures

Quarterly Testing Schedule

Test Type Frequency Responsible Party Evidence Required
SSO Functionality Quarterly CTO Test results, screenshots
MFA Verification Quarterly CTO MFA status report
Access Review Quarterly CTO + CEO Review documentation
Password Policy Quarterly CTO Policy compliance report
Monitoring Validation Monthly CTO Log analysis report

Incident Response and Remediation

Authentication Security Incidents

Types of Incidents:

  • Compromised credentials
  • Unauthorized access attempts
  • MFA bypass attempts
  • SSO configuration issues
  • Password policy violations

Response Procedures:

  1. Immediate Response (0-1 hour)

    • Assess incident scope and impact
    • Contain affected accounts/systems
    • Notify security team and management
  2. Investigation (1-24 hours)

    • Review authentication logs
    • Identify root cause
    • Document incident details
    • Implement temporary controls
  3. Remediation (24+ hours)

    • Reset compromised credentials
    • Update security controls
    • Review and update policies
    • Conduct lessons learned review

Remediation Actions

For Compromised Accounts:

  • Immediate password reset
  • MFA re-enrollment
  • Access review and modification
  • Security awareness training

For System Compromises:

  • SSO configuration review
  • MFA policy enforcement
  • Access control updates
  • Monitoring enhancement

Compliance and Audit

SOC2 Control Mapping

SOC2 Control Authentication Control Evidence Type
CC6.1 Logical access controls SSO/MFA configuration, access logs
CC6.2 System boundaries User provisioning, role assignments
CC6.3 Access procedures Access management policies, procedures
CC7.1 System monitoring Authentication logs, security monitoring
CC7.2 Security events Incident response, alerting

Audit Evidence Requirements

Documentation Required:

  • Authentication policy and procedures
  • SSO configuration documentation
  • MFA implementation details
  • Access management procedures
  • Monitoring and logging configuration
  • Incident response procedures

Evidence Collection:

  • Screenshots of configurations
  • Log samples and reports
  • Policy documentation
  • Test results and validation
  • Incident response documentation

Continuous Improvement

Regular Reviews and Updates

Monthly Reviews:

  • Authentication event analysis
  • Security incident review
  • Policy compliance assessment
  • Technology updates and improvements

Quarterly Reviews:

  • Comprehensive access review
  • Policy effectiveness assessment
  • Technology evaluation
  • Training and awareness updates

Annual Reviews:

  • Complete policy review and updates
  • Technology roadmap planning
  • Compliance assessment
  • Risk assessment updates

Improvement Initiatives

Planned Enhancements:

  • Enhanced SSO integration for additional systems
  • Advanced MFA options (hardware tokens, biometrics)
  • Improved monitoring and alerting
  • Automated access management
  • Enhanced incident response capabilities

Conclusion

Qwestly's authentication strategy provides comprehensive security controls through the combination of Google Workspace SSO and MFA implementation. This hybrid approach ensures secure access to all business systems while maintaining user convenience and compliance with SOC2 requirements.

The implementation includes detailed monitoring, logging, and incident response procedures to ensure continuous security oversight and rapid response to potential threats. Regular testing and validation procedures ensure the effectiveness of authentication controls and compliance with security policies.