IRON RODSecurity

MFA for the Ambulance: Why Just Use a YubiKey Isnt the Answer

Steven Carlson·

Ten seconds to pull out a phone and type a code. That is the difference between a clean login and a provider who keeps a sticky note with their password taped to the tablet lid. In a corporate office, ten seconds is nothing. In the back of an ambulance at 3 a.m. with a critical patient, ten seconds is an eternity.

The security industry loves hardware keys. YubiKeys are the gold standard for phishing-resistant authentication but they are also small, easy to lose, incompatible with half the ruggedized tablets in the field, and a biological hazard when they fall in something you do not want to touch.

Just use a YubiKey is not an answer. It is a suggestion from someone who has never tried to authenticate while wearing gloves in a moving box.

> Covered entities must have in place appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information.

>

> 45 CFR 164.530(c)(1)

The regulation does not specify which MFA method to use. It specifies that the safeguards must work. If the method causes providers to bypass security, the safeguard is not working.

HIPAA Compliant MFA for EMS Tablets

Let me walk through the failure modes of standard MFA methods. Each one has a specific weakness that makes it unsuitable as the sole authentication mechanism.

SMS codes fail because of the rural dead zone problem. Ambulances operate in areas where cellular coverage drops and if the SMS code cannot arrive, the provider cannot log in. SMS is also vulnerable to SIM swapping and is the weakest form of MFA under NIST guidelines.

Authenticator apps fail because of the unlock cycle problem. The sequence requires pulling out the phone, finding the app, reading the code, and typing it. That is four steps. Wearing gloves, in the dark, while the vehicle is moving. Providers skip steps and stay logged in on shared devices or write down codes.

Hardware keys fail because of the where is it problem. A YubiKey is smaller than a car key. In a profession where gear gets dropped and left in pockets or lost between shifts, a physical key is a single point of failure. USB ports on ruggedized tablets are often blocked by protective cases.

The common thread is that all three methods assume a stable, clean, well-lit environment with both hands free. That is not the back of an ambulance.

Best MFA for Ambulance Crews in Rural Areas

A multi-method approach works better than a single solution. Here is the architecture.

Certificate-based authentication. Install device certificates on each ruggedized tablet through MDM. The device itself becomes the something you have with no code to type and no hardware to lose. The certificate binds the session to a specific ambulance unit ID, creating a clear audit trail.

Adaptive or risk-based MFA. Only trigger a hard MFA challenge when the user logs in from an untrusted location or device. If the provider is on the station Wi-Fi or a known trusted network, skip the extra step. Use longer session tokens for active shifts of 12 to 24 hours so the screen can sleep during a call without forcing reauthentication.

Biometric integration. Windows Hello or FaceID on ruggedized devices satisfies the something you are requirement with near-zero friction. Facial recognition works through gloves and takes under a second. The audit requirement for two factors is met by combining the device certificate with the biometric.

The break-glass protocol. Every MFA implementation needs a path for when it fails. A time-limited bypass code issued by a supervisor or dispatcher. Audited and logged but available so that patient care is never delayed by a technical lockout.

This connects to the problem of vendor risk management for small EMS agencies. Many authentication tools come from third-party vendors and you need BAAs in the contracts before deploying.

Avoiding MFA Fatigue in Public Safety

The phrase security as a barrier comes up in every conversation I have with EMS IT directors. When authentication friction slows down clinical work, providers find workarounds including shared logins, permanent sessions, and passwords on sticky notes. These workarounds are worse than any MFA gap because they are invisible to auditors.

MFA fatigue shows up in help desk tickets with providers locked out of their ePCR mid-call and accounts disabled after too many failed attempts. The cost is not just IT time. It is clinical delay.

A certificate and biometric approach reduces friction to nearly zero while satisfying the two-factor requirement. The provider picks up the tablet and is authenticated without typing or searching for a key.

Frequently Asked Questions

Isnt a YubiKey the gold standard for security?

Technically yes. But gold standard security is useless if the key is lost in a pile of linens or does not fit the tablet port. The best security is the one that is used correctly without creating clinical delays.

Can we just use SMS codes since everyone has a phone?

SMS is the weakest form of MFA and is unreliable in rural dead zones where ambulances operate. It creates a critical failure point that can lock providers out of clinical data during a call.

How do we satisfy HIPAA auditors without burning out our staff?

Use adaptive MFA with device certificates and biometrics. This satisfies the two-factor requirement while reducing the extra steps for the provider.

What should we do if a providers MFA device is lost during a shift?

Establish a break-glass protocol with time-limited bypass codes issued by a supervisor. This ensures access without compromising long-term account security.

Closing

Just use a YubiKey is not an answer for the pre-hospital environment. The right approach accounts for where the authentication happens and when it happens and who is doing it. Certificates and biometrics with adaptive triggers and a break-glass path.

Design for the 3 a.m. call, not the 10 a.m. audit. If the system works in the back of a moving ambulance, the audit will take care of itself.

-- Steven

Need help with your agency’s cybersecurity? Get in touch

MFA for the Ambulance: Why Just Use a YubiKey Isnt the Answer | Iron Rod Security