The tool isn't the problem; the transport method is. When auditing Canva MFA, treat any method other than TOTP (time-based one-time password) or WebAuthn (biometric/security key) as a critical vulnerability. 3. The Backup Code Backdoor Every MFA tool generates backup codes. Canva does this elegantly. But here is where creative teams break security: They screenshot the backup codes and paste them into a Slack channel called "#design-assets."

Canva is a browser-first tool. Designers hate logging in. They leave sessions open for weeks. If a malicious actor gets physical access to a logged-in machine (or a remote desktop session), the MFA token is already blessed. The tool did its job at the door, but failed in the living room.

If you use Canva with MFA tools, enforce a policy that backup codes must be stored in a password manager (1Password/Bitwarden) with audit logs—never in Canva’s own cloud folder. 4. SSO + MFA: The Double-Edged Sword Canva’s most mature MFA setup is via SSO (Single Sign-On) through Google Workspace, Microsoft Entra ID, or Okta. This is the gold standard.

Our weekly newsletter

Sign up to get updates on articles, interviews and events.