Score your login defenses using modern risk signals. Tune policies for MFA, passwords, and control. See results instantly and export easy reports for audits.
Fill the fields and submit to compute a security score. Use realistic values for your environment.
This calculator scores controls using a weighted rubric (0–100). Each control contributes points based on strength and coverage.
| Scenario | MFA | Password | Lockout/Rate Limit | Session | Estimated Score |
|---|---|---|---|---|---|
| Legacy login | None | 8 chars, weak policy | None / No | 240 min + remember me | 35 |
| Baseline modern | Authenticator | 12 chars, medium policy | Soft / Yes | 30 min, no remember | 74 |
| High assurance | Passkey | 16 chars, strong policy | Smart / Yes | 15 min + re-auth | 92 |
Scores are illustrative and depend on your exact configuration.
The calculator converts common login controls into a 0-100 score so teams can compare environments consistently. A difference of 10 points is treated as a meaningful shift in exposure. For example, moving from no MFA to authenticator-based MFA typically adds 18 points, which can push an environment from Elevated to Moderate risk when other settings remain stable.
Password strength is weighted at 25 points because weak credentials remain the easiest entry point. Increasing the minimum length from 8 to 12 characters raises the length component by roughly 6 points. Enabling breach or reuse detection removes a 4-point penalty and reduces credential stuffing success when attackers replay known passwords.
Practical targets used by many programs include: 12-16 character minimums, banned common passwords, and periodic policy reviews every 6-12 months.
Brute-force controls contribute up to 20 points because automated traffic can scale quickly. A smart lockout policy earns 14 points versus 0 for none. Rate limiting adds 4 points by slowing credential guessing, and adaptive challenges add 2 points by raising cost only for suspicious attempts. A failed-attempt threshold between 5 and 10 supports containment with manageable user friction.
Session hygiene contributes 15 points and acts as a blast-radius reducer when tokens are stolen. Idle timeouts of 15-30 minutes score higher than multi-hour sessions. Disabling persistent remember-me sessions increases the score by about 3 points, while re-authentication for sensitive actions adds 3 points by protecting password changes, payouts, and admin operations.
Treat the component breakdown like a backlog: pick the lowest category first, then choose one control that yields at least a 5-point overall lift. Many teams sequence work as: MFA upgrades -> rate limiting and smart lockout -> breach password checks -> session tightening -> device and IP reputation signals -> monitoring and audit log hardening. Recalculate after each change and export reports for evidence tracking. Use the PDF export for audits and the CSV export for trend charts. Teams often set targets of +5 points per quarter until reaching 80 or higher.
Higher is safer, but the target depends on risk. Consumer apps may accept moderate friction, while admin portals should aim for 85+ with strong MFA and short sessions.
SMS can be intercepted or redirected. Passkeys and hardware-backed methods resist phishing and reduce reliance on telephony security, so they receive higher assurance points.
Use the weakest common state. If only some users have strong MFA, score the deployment lower until coverage is near universal, then raise the selected level.
Recalculate after each control change and on a regular cadence, such as monthly or quarterly. Exports help document progress for audits and leadership updates.
No. It is a fast, repeatable benchmark for control strength. Use it alongside testing, logging reviews, and threat modeling to validate real-world attack paths.
Roll out authenticator or passkey MFA for all users and enforce it for risky actions. Combine with rate limiting and a smart lockout policy for a rapid lift.
Tip: Pair this score with periodic penetration tests and phishing simulations for a realistic view of account takeover risk.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.