Skip to contentAbout Fig Group
Technical Guides

Cyber Essentials for Okta: configuration guide

Exactly how to configure Okta (Workforce Identity) to satisfy Cyber Essentials v3.3 - MFA policies, Authentication Policies, session lifetime, break-glass accounts, and evidence patterns.

Author

Jay Hopkins

Editor

Edited by Jack Wickham

Published

Last reviewed

Read time

7 min read

Share

Cyber Essentials for Okta: configuration guide

Okta is straightforward to configure for Cyber Essentials v3.3 - enforce MFA with a phishing-resistant factor on every user, require 12-character minimum passwords, configure Authentication Policies that block legacy and low-assurance flows, keep session lifetime ≤ 12 hours, and separate privileged admin accounts with named break-glass access. The common failure is a Global MFA policy that appears to enforce MFA but has a long list of exceptions that silently swallow admin accounts.

1. What Cyber Essentials v3.3 needs from your IdP

  • MFA on every account - no exceptions, including service accounts where feasible
  • Minimum password length 12 characters, complexity / breach check
  • No legacy authentication (basic auth, IMAP, pop, ancient CRM integrations)
  • Separate administrative accounts for privileged work
  • Session management with idle timeout and re-authentication on sensitive operations

Okta's engineering maps to this with Authenticators, Authentication Policies, and Global Session Policies.

2. Authenticator enrolment

In Security > Authenticators:

  • Okta Verify (push / biometric): primary recommended factor
  • FIDO2 / WebAuthn: required factor for administrators
  • Security Questions: disable
  • SMS / Voice: disable or allow only as a fallback enrollment step (NIST has deprecated SMS, and modern Cyber Essentials assessors increasingly expect phishing-resistant factors for admins)
  • Password: minimum length 12, complexity rules, breach check on

3. Authentication Policies (per application)

The old "sign-on policies" are gone; Okta now scopes Authentication Policies to app groups.

For every application that touches corporate data:

  • Require MFA every time on admin apps (Okta Admin Console, AWS, GCP, Azure portals)
  • Require MFA every session on most end-user apps
  • Require phishing-resistant factor (FIDO2 / Okta Verify with FastPass) for administrators
  • Block unknown devices option for critical apps (Admin Console, financial systems)

Export the Authentication Policy JSON for each app and keep it - it's one of the cleanest evidence artefacts.

4. Global Session Policy

Settings > Authentication > Global Session Policy:

  • Maximum Okta session lifetime: 12 hours
  • Maximum Okta session idle time: 2 hours
  • Require re-authentication on every session (or bounded by the 12-hour maximum)
  • Persistent cookies off for untrusted browsers

5. Administrator accounts

  • No standing Super Admins beyond 2–3 people. Use Okta's standard delegated admin roles for lower-privilege work.
  • Named admin accounts - no shared admin logins
  • Separate admin identity for each admin (their everyday user account is not a Super Admin)
  • Break-glass account(s) - one or two accounts with Super Admin, FIDO2 hardware keys, excluded from some Authentication Policies to remain accessible if something breaks, credentials sealed and rotation-logged
  • IP-restrict admin sessions to office IPs and VPN ranges if feasible

6. ThreatInsight + device trust

Not strictly required by Cyber Essentials but highly recommended:

  • ThreatInsight enabled - blocks known-bad IPs from sign-in attempts
  • Okta Device Access or Okta FastPass - ties sessions to device posture, strengthens user-access-control evidence
  • Device integration via endpoint management (Jamf, Intune, Kandji) for device assurance

7. De-provisioning

Cyber Essentials expects accounts disabled promptly on leaver events.

  • Inbound SCIM provisioning from your HR system where possible
  • Scheduled (e.g. daily) reconciliation between HR active employees and Okta active users
  • Leaver workflow: suspend immediately, delete within 30 days

8. Evidence assessors expect

  • Okta Administrator count (must be low) and Super Admin list
  • Authentication Policy JSON export for each critical app
  • Global Session Policy screenshot
  • Authenticator enrolment report (% of users with at least one phishing-resistant factor enrolled)
  • User leaver report matched against HR leaver list for last 12 months

9. Common failure points

1. "Require MFA every 7 days" - too permissive for admin apps. Tighten.

2. Password factor without a MFA requirement in one legacy Authentication Policy. Audit every policy.

3. A shared admin account from the original rollout ("sso-admin"). Replace with named admins.

4. SMS as primary factor for the exec team. Migrate to Okta Verify push + FastPass or FIDO2.

5. No break-glass account - you'll regret this the first time a misconfigured policy locks you out. Create two, store keys in the safe.

What Fig checks

Our CE readiness scan reviews Okta configuration via read-only API access, flags gaps in Authentication Policies, MFA enrolment, and admin segregation against v3.3 requirements. Okta-centric organisations pass first-time at >96% after the standard 1-2 fixes.

Start Cyber Essentials - from £299.99 + VAT | Pricing tiers | CE Plus

About the author

Jay Hopkins

Jay Hopkins

Managing Director, Fig Group

IASME-licensed Cyber Essentials AssessorIASME Cyber Assurance Assessor

Jay Hopkins is the Managing Director of Fig Group and an IASME-licensed Cyber Essentials assessor. He was previously Head of Technology for a global regulated firm. He works with UK organisations across regulated sectors on baseline compliance, supply-chain assurance, and AI-augmented security tooling.

Next step

Want to see how Fig handles this?

Discover how Fig helps organisations prepare for security assessments and maintain ongoing compliance.

Request a demo

Related solutions

Continue exploring Fig