πŸ“˜Study Focus | Domain 5: Identity and Access Management (IAM)

πŸ“˜ Domain 5: Identity and Access Management (IAM)

πŸ”‘ Flashcard Topics (Acronyms, Models, and Authentication Nuance)


πŸ” Authentication, Authorization, Accounting (AAA)

  • Authentication = Prove identity (e.g., password)

  • Authorization = What you’re allowed to do

  • Accounting = Logging and tracking usage


πŸ”‘ Authentication Factors

  • Something you...
    Know (password), Have (token), Are (biometrics), Do (signature), Are from (location/IP)

  • Multifactor = from different categories
    Two passwords ≠ MFA; password + fingerprint = MFA.


πŸ“› Access Control Models

πŸ”“ Discretionary Access Control (DAC)

  • Owner controls access. Based on user identity. Used by Windows OS.

πŸ” Mandatory Access Control (MAC)

  • System-enforced, labels + clearances. Used in military.

🧩 Role-Based Access Control (RBAC)

  • Access assigned based on job function (role).

🎯 Attribute-Based Access Control (ABAC)

  • Access based on multiple factors (e.g., user + location + time).

🧱 Rule-Based Access Control

  • If-then conditions. Common in firewalls or dynamic environments.


πŸ› ️ Access Control Mechanisms

  • Least Privilege = Users get minimum needed rights

  • Separation of Duties = Split critical tasks between users

  • Need to Know = Restrict access to only what’s relevant

  • Job Rotation = Reduces fraud, increases knowledge transfer


🧾 Access Control Lists (ACLs)

  • Lists permissions for subjects on objects (e.g., read/write). Common in file systems and routers.


πŸ†” Identity Management Concepts

  • Identity Proofing = Confirming identity during onboarding

  • Provisioning = Granting access rights to users

  • Deprovisioning = Removing access when no longer needed

  • Federated Identity = Single identity across multiple orgs

  • Single Sign-On (SSO) = One login, access many systems


πŸ” Auth Protocols (Must-Memorize Acronyms)

πŸ›‘️ Kerberos

  • Uses tickets (TGTs), mutual authentication, time-sensitive.

  • Requires trusted third party (KDC).

πŸ” SAML (Security Assertion Markup Language)

  • Used in SSO for web apps. XML-based.

πŸ”“ OAuth 2.0

  • Delegated access (e.g., login with Google). Doesn’t share password.

πŸͺͺ OpenID Connect

  • Built on OAuth 2.0 — adds authentication (ID tokens).

🧠 RADIUS vs TACACS+

  • RADIUS = UDP, combines auth/accounting, encrypts password only

  • TACACS+ = TCP, separates AAA, encrypts entire packet


🧬 Biometric Performance Metrics

  • FRR (False Rejection Rate) = Legit user denied

  • FAR (False Acceptance Rate) = Impostor allowed

  • CER (Crossover Error Rate) = Point where FAR = FRR → lower is better


πŸ›‘ Common Access Attacks

  • Brute Force = Try all combinations

  • Dictionary Attack = Use wordlists

  • Replay Attack = Resend valid authentication info

  • Pass-the-Hash = Steal and reuse NTLM hashes

  • Credential Stuffing = Use leaked credentials on other sites


This domain is acronym-dense and easily testable via scenarios. Reviewing flashcards daily is key for mastery here.


Comments

Popular posts from this blog

🧭 CISSP Study Note: Guidelines

πŸ’Έ CISSP Study Note: Risk Transference

πŸ“ CISSP Study Note: Standards