Identity and Access Management: CISSP, #5
()
About this ebook
Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access management, discretionary and mandatory access control, types of controls and related risk and access control attacks.
Selwyn Classen
A seasoned and highly qualified IT/IS professional with over 20 years working experience within the Petrochemical industry (i.e. Supply chain management, Knowledge management, Product and Quality management, Business analysis and processing) including the Telecommunications industry.
Other titles in Identity and Access Management Series (8)
Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Software Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratings
Read more from Selwyn Classen
Risk Management and Information Systems Control Rating: 5 out of 5 stars5/5Incident Management Rating: 0 out of 5 stars0 ratings
Related to Identity and Access Management
Titles in the series (8)
Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Software Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratings
Related ebooks
Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsSoftware Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsCISSP in 21 Days - Second Edition Rating: 3 out of 5 stars3/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsCISSP For Dummies Rating: 4 out of 5 stars4/5Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Security Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCISSP Exam Prep Questions, Answers & Explanations: 1500+ CISSP Practice Questions with Solutions Rating: 3 out of 5 stars3/5(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests Rating: 5 out of 5 stars5/5Managing Cybersecurity Risk: Cases Studies and Solutions Rating: 0 out of 5 stars0 ratingsIdentity And Access Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 SSCP CBK Reference Rating: 0 out of 5 stars0 ratingsBuilding a Life and Career in Security Rating: 5 out of 5 stars5/5Information Systems Security NIST 800 2-in-1 Rating: 0 out of 5 stars0 ratingsCISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsIT Security Concepts Rating: 5 out of 5 stars5/5CISM Certified Information Security Manager Exam Prep and Dumps ISACA CISM Exam Guidebook Updated Questions Rating: 0 out of 5 stars0 ratingsBusiness Practical Security Rating: 0 out of 5 stars0 ratingsAn Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5Destination CISSP Rating: 5 out of 5 stars5/5Security Architect: Careers in information security Rating: 4 out of 5 stars4/5Securing Critical Infrastructures Rating: 0 out of 5 stars0 ratingsCASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsKali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5
Reviews for Identity and Access Management
0 ratings0 reviews
Book preview
Identity and Access Management - Selwyn Classen
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
IDENTITY AND ACCESS MANAGEMENT
First edition. April 2, 2020.
Copyright © 2020 Selwyn Classen.
Written by Selwyn Classen.
Table of Contents
Identity and Access Management
Course Outline
Control Physical and Logical Access to Assets
Layered Defense
Controls
Key Points
Manage Identification & Authentication of People and Devices
What You Have
Authorization
Single Sign-On
Kerberos
Credential Management Systems
Summary
Integrate Identity as a Service
Integrate Third-party Identity Services
Implement and Manage Authorization Mechanisms
Rule-Based Access Control
Context-Dependent Access Control
Summary
Prevent or Mitigate Access Control Attacks
Summary
Manage the Identity and Access Provisioning Lifecycle
Summary
Identity and Access Management
This course is an outline of the Identity and Access Management goal for the CISSP, which includes the theories, threats and concepts that are part of managing access to a diverse set of technologies and systems.
Course Outline
Identity and Access Management is one of the 8 domains that make up the CISSP examination. This course is an overview of identity and access management, including the theories, threats and concepts that are part of the managing access to a diverse set of technologies and systems. This course will help you prepare for the Certified Information System Security Professional (CISSP) examination. Some of the main topics we will cover include: theory and concepts of identity in access management, discretionary and mandatory access control, types of controls and related risk, and access control attacks. By the end of this course, you will have an understanding of identity and access management.
Control Physical and Logical Access to Assets
Welcome, to the CISSP - Identity and Access Management domain. This domain - Identity and Access Management - is critically important as you prepare for the CISSP. So in this first area, we're going to look at how do we control physical and logical access to our assets. This starts with controlling access and managing identity, and in this course, we're going to help you prepare for this identity and access management domain of the CISSP examination. We're going to understand the concepts of managing both external and internal access and identities, something that's made our life an awful lot more difficult, and we're going to take a look at some of the threats to access control systems and technologies we use today.
This domain makes up about 13% of the CISSP examination or about 30 questions. The area of access controls includes both physical access and logical or sometimes called technical access. We need to manage access, and that is that we grant access to those who should have it but deny access to those who should not. When we grant access, we grant the correct level of access to the person as well. So thereby, we protect our assets. For example, those assets include information, that which is sensitive, critical, which is protected by regulation. Protecting the information systems that provide access to our various job functions, critical infrastructure, as well as access to information itself. We need to protect devices from contamination or corruption, and of course, protect our buildings, that only authorized personnel can get into our buildings, and only to the areas of our buildings they should be allowed into.
In all of these ways, when we manage access to assets, the primary people we're going to manage are our internal employees. Our customers and so on are external, but the internal employees are the ones that have the highest level of access, and they include everyone from users to some of our administrators who then manage and operate our systems on our behalf. When we take a look at external parties, this is one of the things that has changed the world of access control in the past few decades. As we have moved from an access control where primarily the only people on our systems were internal, and now the majority of people who are accessing our systems and data are external, they are customers, they are web application clients, and we have to carefully manage those external entities so they don't have a level of access that would allow them to compromise our systems. We manage access granted to people but also processes because in some cases, today we have links with other organizations that can pass this information through a defined, but then, carefully regulated process. The area of identity and access management is an important area of responsibility for a security manager. This is one of the areas that are of greatest risk to the organization if it is not properly managed. And the management of identity and access controls includes both the provisioning of access and managing of the access while the persons an employee, but also removing that access when it should no longer be granted.
We also need to check and see how well our access control system is working. We review the logs, we monitor and ensure that no one is trying to access things they shouldn't, or maybe we can detect through our logs some types of attack precursors. Attack precursors can be the indications where somebody's probing and trying to get into our system. There is a lot of risks associated with access control: compromise of the confidentiality of our systems and information, compromise of the integrity of the data we have, but also the loss of availability of our systems or data that is so essential for business processes. All of these are important, and when we consider risk, we should consider the risk to the protection of our assets, which includes both considering the risk of improper access to data, but also of improper access to systems.
An asset is defined as an item or property that's of value to its owner. Many assets are tangible, such as money or a