Section 17.157 Identity and Access Management (IAM) Flashcards
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
Identity and Access Management (IAM)
■ Critical component of enterprise security, focusing on managing access to information
■ Ensures the right individuals have access to the right resources at the right times for the right reasons
Four Main IAM Processes
Identification
● User claims an identity using a unique identifier (e.g., username or email address)
● Ensures user legitimacy and accuracy of provided information
e.g creating an account or creating an ID for an account
Four Main IAM Processes
Authentication
Verifies the identity of a user, device, or system. Typically involves validating user credentials against an authorized userdatabase
● Methods
○ Passwords
○ Biometrics
○ Multi-factor authentication
e.g Enterering a password after their username
Four Main IAM Processes
Authorisation
Process that determines what permissions or levels of access the user has
e.g employees in human resources will have access to personal files whereas employees in finance will NOT have access to personal informttion but financial information instead
Four Main IAM Processes
Accounting (Auditing)
Tracks and records user activities. Helps detect security incidents, identify vulnerabilities, and provide evidence in case of breaches
○ Logins
○ Actions
○ Changes
Key IAM Concepts: Provisioning and Deprovisioning of User Accounts
Provisioning
Creating new user accounts, assigning permissions, and providing system access
e.g HIring a new employee the employees account must be created
Key IAM Concepts: Provisioning and Deprovisioning of User Accounts
Deprovisioning
Removing access rights when no longer needed (e.g., when an
employee leaves)
e.g Removing access rights when an employee leaves the company
Key IAM Concepts
Identity Proofing
Process of verifying a user’s identity before creating their account
● May involve checking personal details or providing identification
documents (e.g., driver’s license or passport)
Key IAM Concepts:
Interoperability
Ability of different systems, devices, and applications to work together and share information
● In IAM, it can involve using standards like SAML or OpenID Connect for secure authentication and authorisation
Key IAM Concepts:
Attestation
Process of validating that user accounts and access rights are correct and up-to-date
● Involves regular reviews and audits of user accounts and their access rights