Insights article

Enhancing Cybersecurity in Urban Planning with Multi-Factor Authentication

Alex Moon
Published: 15/04/2024

Share this

 
 
 

The Rising Need for Cybersecurity in Urban Planning

In the evolving landscape of urban development, where technology increasingly interfaces with city planning, the need for robust cybersecurity measures has never been more critical. As urban planners integrate more digital tools into their processes, securing these systems becomes paramount to safeguard sensitive data and maintain public trust.

One key strategy that has emerged is the implementation of Multi-Factor Authentication (MFA), an essential component not just for enhancing security but also for meeting the stringent requirements of regulatory compliance and cyber essentials certification.


What is Multi-Factor Authentication (MFA)?

Multi-Factor Authentication (MFA) involves verifying a user's identity by requiring multiple pieces of evidence before granting access to a system. This typically includes something the user knows (a password), something the user has (a smartphone app or hardware token), and something the user has (biometric data). In the context of urban planning, MFA can prevent unauthorised access to critical infrastructure data, thus protecting against potential cyber threats that could disrupt city operations.

In the UK, organisations such as Homes England now require their suppliers to be compliant to Cyber Essentials certification. This certification explicitly requires setup of multi-factor authentication on applications in use. Therefore it is essential that planning consultancies, architecture firms, and other suppliers can draw on platforms that support MFA, in order to be compliant with Cyber Essentials requirements. 


Best Practices for Implementing MFA in Urban Planning

When implementing MFA within urban planning systems, it's important to follow best practices to ensure both efficacy and user convenience:

  • SMS vs authenticator apps: SMS text messages have become a popular way for multi-factor authentication on consumer services. However, they have the disadvantages that cellular signals can be intercepted, and cellular connection is required. Authenticator apps do not have those limitations.  
  • Software vs. Hardware Tokens: While hardware tokens provide a high level of security, software-based TOTP apps are more cost-effective and easier to distribute among users. Authenticator apps generate a Time-based One-Time Password that users enter during the login process. 
  • QR Code Authentication: QR codes are a common method for the second factor in MFA setups. It is critical that these codes expire to maintain security, as non-expiring QR codes can be vulnerable if intercepted by adversaries.

Here is a list of common authenticator apps including Apple PassKey, Google Authenticator, or Microsoft Authenticator. 

Multi-factor authentication is a key part of enhancing system access security. It will remain vigilant to emerging cyber threats, and even multi-factor authentication alone may require additional protective measures, like ensuring that end user devices are fully password secured and encrypted.


Case Study: PlaceChangers' Implementation of MFA

At PlaceChangers, we recognised the importance of robust security measures and implemented MFA across our organisation. 

Here’s how we approached the integration:

Organisation admins: System administrators for a user organisation can activate One Time Passwords (OTPs) for all users within their organisation through a secure, password-protected toggle. Upon activation, all users and admins received an email outlining the steps for setting up MFA and will have five days to complete their setup.

User Setup Process: Users within an organisation will be prompted to set up MFA. This involved downloading a compatible authenticator app (e.g. Microsoft Authenticator or Google Authenticator), scanning a provided QR code, and entering the generated OTP to complete the setup. A new OTP will be required for each subsequent log-in.

Organisation admins will be required to reset their organisations' multi-factor authentication from time to time. 

This process was designed to be straightforward to encourage compliance and minimise disruption and does not apply to consultation participants, who can always participate anonymously and without log-in. 


The Future of Secure Urban Planning

As digital tools become more embedded in urban planning, the security of these tools must evolve. Innovations in MFA, such as biometric verification and advanced encryption methods, continue to enhance security frameworks. 

Urban planners must stay abreast of these advancements and continuously update their security practices to counter emerging cyber threats.

The integration of Multi-Factor Authentication within urban planning is not just about adhering to best practices—it's about proactively protecting the infrastructures that cities depend on. As we continue to navigate the complexities of urban development in a digital age, MFA stands out as one aspect of a range of critical tools in the cybersecurity arsenal, ensuring that access to critical data is further secured.


You might also like

Subscribe to our quarterly newsletter

Receive our latest news and insights directly to your inbox.