Users Sharing Authenticators

Detects users with shared authenticators/phones. Shared authenticators reduce security and user accountability and increase the attack surface.

It is recommended to avoid sharing authentication credentials, including phone authenticators, and instead, encourage each user to have their own separate authentication methods to protect their accounts and data from potential threats.

Recommended Actions

We recommend not sharing phones and devices where possible; please investigate.

If user sharing devices number is high, please make sure your onboarding process is secured.




Last updated