Lesson 4
Lesson 4: Identity and Access Management (IAM)
Authentication
Factors of Authentication:
Knowledge: Passwords, PINsOwnership: Hardware tokens (OTP, FIDO U2F), soft tokens (SMS, authenticator apps)Inherence: Biometrics (fingerprint, facial recognition)Location: Geolocation/IP-based
Password Security Concepts:
- Length: Total number of characters (longer = stronger)
- Complexity: Mix of letters, numbers, symbols
- Aging: Forces periodic password changes
- Reuse History: Blocks reuse of recent passwords
- NIST Guidance: No aging, allow phrases, no hints
- Passphrases: Long, memorable phrases (recommended)
Password Managers: OS/browser-based, third-party, per-site generation
Multifactor Authentication (MFA)
True MFA: Combines different factors (password + biometric)
Biometrics:
- Enrollment process
FAR/FRRrates (False Accept Rate/False Reject Rate)- Throughput/cost considerations
Hard Tokens:
Smart cards, OTP fobs, FIDO U2F security keys
Soft Tokens:
SMS, email, push notifications (interception risks)
Passwordless Authentication
- Public/private key pairs (no PKI required)
- Local gestures (biometric/PIN for proof of presence)
- Attestation for authenticator trust
Access Control Models
DAC (Discretionary): Owner-managed ACLs, vulnerable to privilege abuseMAC (Mandatory): System-enforced labels/clearancesRBAC (Role-Based): Permissions tied to roles/groupsABAC (Attribute-Based): Context-aware (user/object attributes)Rule-Based: System-defined rules (time/location policies)
Least Privilege Principle
Minimal permissions, auditing for creep
Authorization Challenges:
Insufficient Permissions: Reduced productivity, frequent access requestsOver-Provisioning: Increased attack surface, privilege abuse risks
Remediation: RBAC, periodic audits, access reviews
Account Lifecycle
Provisioning:
Identity proofing, credential issuance, asset allocation Linking systems increases automation of onboarding
Deprovisioning:
Disabling accounts/roles upon exit
Account Restrictions:
Location-Based: Network/IP, geolocationTime-Based: Logon hours, temporary permissions
Privileged Access Management (PAM)
Zero Standing Privileges: Ephemeral credentials, just-in-time accessSecure Admin Workstations: Vaulting/brokering credentials
Identity Management
Authentication Providers:
- Local: Windows (NTLM/Kerberos), Linux (
/etc/passwd,/etc/shadow, PAM) - Network/Remote: LDAP, directory services
Directory Services:
LDAP/X.500: Distinguished names (CN=User, OU=Dept, DC=org)Active Directory: Group Policy Objects (GPOs)
Single Sign-On (SSO)
Kerberos:
KDC (Key Distribution Center): Security guard checking ID and issuing temporary passesTGT (Ticket-Granting Ticket): Temporary pass showing to KDC to get service tickets- Process: Login → Get TGT → Request Access (show TGT) → Use Service (show service ticket)
- Tickets expire quickly, no passwords sent over network after login
- Mutual authentication for service tickets
Federation:
- Identity Providers (IdP) & Service Providers (SP)
OAuth: RESTful APIs, JWT tokens for authorization (not authentication), implements SSOSAML: XML-based assertions (signed, HTTPS/SOAP), federating network/cloud systemsOpenID Connect (OIDC): Tokens for identity verification
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources