Authentication method requiring two or more verification factors.
Australian Cyber Security Centre. (2023, November). Essential Eight explained. cyber.gov.au. https://www.cyber.gov.au/resources-business-and-government/essential-eight-maturity-model/essential-eight-explained