{"id":2033,"date":"2022-03-28T15:35:42","date_gmt":"2022-03-28T22:35:42","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2033"},"modified":"2023-11-07T15:34:37","modified_gmt":"2023-11-07T20:34:37","slug":"securing-the-identity-lifecycle-part-2-resets-and-fail-safes","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","title":{"rendered":"Mengamankan Siklus Hidup Identitas Bagian 2: Reset dan Pengaman Gagal"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Pelaku ancaman memprioritaskan serangan yang mengeksploitasi pengaturan ulang MFA, gagal membuka, dan momen lain dengan tingkat perubahan tinggi untuk mendapatkan akses. Pelajari praktik terbaik tentang cara mencegahnya, mengamankan organisasi Anda, dan menyederhanakan akses bagi pengguna Anda. <\/p>","protected":false},"author":2,"featured_media":3189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-2033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multi-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Identity Lifecycle Part 2: Resets and Fail-Safes - RSA<\/title>\n<meta name=\"description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\" \/>\n<meta property=\"og:description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-28T22:35:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T20:34:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\" \/>\n<meta name=\"twitter:description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\",\"datePublished\":\"2022-03-28T22:35:42+00:00\",\"dateModified\":\"2023-11-07T20:34:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"articleSection\":[\"Multi-Factor Authentication\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\",\"name\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"datePublished\":\"2022-03-28T22:35:42+00:00\",\"dateModified\":\"2023-11-07T20:34:37+00:00\",\"description\":\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"width\":1200,\"height\":675,\"caption\":\"rsa-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mengamankan Siklus Hidup Identitas Bagian 2: Reset dan Pengaman Gagal - RSA","description":"Pelaku ancaman mengeksploitasi pengaturan ulang MFA, kegagalan pembukaan, dan momen lainnya untuk mendapatkan akses. Pelajari cara mencegahnya.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","og_locale":"id_ID","og_type":"article","og_title":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","og_description":"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.","og_url":"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","og_site_name":"RSA","article_published_time":"2022-03-28T22:35:42+00:00","article_modified_time":"2023-11-07T20:34:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","twitter_description":"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","datePublished":"2022-03-28T22:35:42+00:00","dateModified":"2023-11-07T20:34:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"},"wordCount":8,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","articleSection":["Multi-Factor Authentication"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","url":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","name":"Mengamankan Siklus Hidup Identitas Bagian 2: Reset dan Pengaman Gagal - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","datePublished":"2022-03-28T22:35:42+00:00","dateModified":"2023-11-07T20:34:37+00:00","description":"Pelaku ancaman mengeksploitasi pengaturan ulang MFA, kegagalan pembukaan, dan momen lainnya untuk mendapatkan akses. Pelajari cara mencegahnya.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"]}]},{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","width":1200,"height":675,"caption":"rsa-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solusi Keamanan Siber dan Manajemen Risiko Digital","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/comments?post=2033"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2033\/revisions"}],"predecessor-version":[{"id":27139,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2033\/revisions\/27139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media\/3189"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media?parent=2033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/categories?post=2033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/tags?post=2033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}