Required methods
State whether the team requires passkeys, security keys, authenticator apps, or a combination. If SMS remains allowed, say exactly where and for how long.
Recovery and exceptions
Specify how a user proves identity, who can approve a reset, what evidence is required, and when a temporary exception can be granted.
Review cadence
Policies should be revisited on a schedule. Review which methods are in use, whether the chosen methods still match the company's risk profile, and whether any emergency exceptions need closure.
Implementation checklist
- Use the template as a starting point and adapt it to your own control model.
- Publish the same policy in a format employees can actually read.
- Add an owner, an effective date, and a review date to the final policy.
Policy cautions
- A policy without a recovery path is only half a policy.
- Do not copy a template without checking whether it fits your platform mix.