二段階認証のバックアップ戦略 - 端末紛失でも慌てない準備
About 13 min read
You enabled two-factor authentication on all your important accounts - excellent security hygiene. But then your phone screen shatters, or worse, you lose the device entirely. Suddenly, the security measure designed to protect you becomes the barrier locking you out. According to a 2024 Yubico survey, 34% of users who experienced device loss had difficulty accessing accounts protected by 2FA. The irony is painful: the more seriously you take security, the more devastating a device loss becomes without proper backup planning. This article provides a complete backup strategy for two-factor authentication, ensuring you are never locked out regardless of what happens to your primary device.
Reliable Storage of Backup Codes
Obtaining and Managing Backup Codes
When you set up two-factor authentication, most services issue recovery codes (backup codes). These are typically 8-10 single-use codes serving as a last resort when your authentication device is unavailable. Google issues 10 eight-digit codes, GitHub issues 16 alphanumeric codes, and Microsoft issues one 25-digit code. These codes are displayed only once at issuance, and many services cannot re-display them later, so you must save them reliably the moment they are issued.
Backup code storage must be physically separated from the authentication device. Saving in your smartphone's notes app is the worst choice - losing the device means losing the codes simultaneously. Three recommended storage methods: First, print on paper and store in a fireproof safe. Second, save in a password manager's secure notes (but store the password manager's own backup codes elsewhere). Third, save on an encrypted USB drive stored at a location separate from your home. Ideally, use two or more of these methods together.
Multi-Device Registration and Authenticator App Migration
Registering TOTP Secrets on Multiple Devices
When setting up TOTP (Time-based One-Time Password), you can register on multiple devices simultaneously at the QR code scanning stage. For example, scanning the same QR code on both your main smartphone and a tablet (or an old smartphone used on Wi-Fi only) means both devices generate identical codes. This allows continued authentication on the backup device if the main one is lost. Saving a screenshot of the QR code allows later registration on additional devices, but this screenshot must be encrypted and stored securely.
Authenticator App Migration Procedures
When changing smartphones, authenticator app data migration is one of the most critical tasks. Google Authenticator added cloud sync in 2023, but since end-to-end encryption is not applied, it is not recommended for security-conscious users. Microsoft Authenticator supports backup via iCloud/Google account. Authy provides multi-device sync as a standard feature, making migration smoothest during device changes. The basic migration steps are: (1) install the authenticator app on the new device, (2) migrate using the old device's export function or re-setup 2FA on each service, (3) verify codes generate correctly on the new device, (4) delete data from the old device.
Hardware Security Key Backup Strategy
The Need for Spare Keys and Registration Methods
When using a hardware security key as your primary two-factor method, having at least one spare key is essential. If you lose or damage your key without a spare, you cannot access your accounts. Google's internal security policy issues all employees 2 security keys - one carried at all times, one stored at home. Individual users should similarly maintain a 2-key setup: main and spare. The spare key must be pre-registered on all the same accounts as the main key.
Store the spare key in a different location from the main key. If you carry the main key on your keychain, store the spare in a fireproof safe at home. For frequent travelers, consider leaving it in a workplace locker or with a trusted family member. For YubiKey, you don't need two identical models. Using a YubiKey 5 NFC (USB-A + NFC) as main and a YubiKey 5C Nano (USB-C, compact for storage) as spare is an effective combination. The key is storing the spare where you can quickly access it when needed while choosing a location with low theft risk. <AmazonLink keyword="セキュリティキー" locale={locale} className="amazon-inline-link">Security keys like YubiKey (Amazon)</AmazonLink> are recommended to purchase in sets of 2 including a spare.
Building a Comprehensive Backup System
The most robust 2FA backup system combines multiple methods in a defense-in-depth approach. The recommended configuration is: (1) primary authentication method (authenticator app or security key), (2) TOTP simultaneously registered on a backup device, (3) spare hardware security key, (4) backup codes printed on paper (stored in fireproof safe), (5) copy of backup codes in password manager secure notes - 5 layers total. With this redundancy, even if your home burns down or you lose all devices simultaneously, at least one recovery path remains. Conduct a rehearsal every six months to verify all backup methods remain valid.
Was this article helpful?