The login fails. An alert flashes. Access can’t continue until the user proves they are who they say they are. This is GDPR step-up authentication in action — a demand for stronger proof when risk spikes.
Under the General Data Protection Regulation (GDPR), controllers must safeguard personal data with security measures that match the level of risk. Step-up authentication is one of those measures. It triggers an additional verification step only when necessary: suspicious activity, sensitive data requests, or context changes that could expose personal information. This approach limits friction for low-risk actions while locking down high-risk ones.
In practice, GDPR step-up authentication often uses multi-factor authentication (MFA) for the extra layer. It may challenge the user with a hardware key, SMS code, authenticator app, or biometric check. Policies define when to enforce step-up — based on IP changes, device fingerprint mismatches, unusual access patterns, or elevated role permissions. The process must be documented and backed by technical controls. Logs must record when it was used, why it was triggered, and whether access was granted or denied.