Check provider logo

Organization requires members to have two-factor authentication enabled

organization_members_mfa_required

Severitycritical
by Prowler

GitHub organization settings require all members to use two-factor authentication (2FA).

The evaluation determines whether access to organization resources is conditioned on members having 2FA enabled.

Risk

Without enforced 2FA, stolen or reused passwords enable account takeover, leading to:

  • Loss of code integrity via unauthorized commits
  • Confidential data exposure from repos and secrets
  • Availability impact from settings changes, token revocation, or deletions
Run this check with Prowler CLI

prowler github --checks organization_members_mfa_required

Recommendation

Enforce org-wide 2FA for all members and collaborators, preferring secure methods (passkeys, security keys, authenticator apps, GitHub Mobile) over SMS.

Apply least privilege, integrate with SSO, restrict token scopes, and use branch protection for defense-in-depth. Include bots/service accounts and define recovery options.

Remediation

Other
  1. Sign in to GitHub as an organization owner with 2FA enabled
  2. Go to your organization > Settings
  3. In the left sidebar, click Security > Authentication security
  4. Under Two-factor authentication, select Require two-factor authentication for everyone in your organization
  5. Click Save, then Confirm

Source Code

Resource Type

NotDefined

References