Linked below you will find a series of implementation guidance to help you in developing your authenticator management strategy.
Allow list implementation guidance
Deny list implementation guidance
Vulnerability remediation implementation guidance
Adding an additional authentication factor implementation guidance
Step up authentication implementation guidance