Identity and Access Management

Designing systems that ensure only authorized identities access resources securely and efficiently.

Introduction

Identity and Access Management (IAM) ensures that users, devices, and services are properly identified, authenticated, and authorized before accessing resources. It is a central control point for enforcing security policies.

For ICT professionals, IAM failures are a leading cause of breaches. Poor authentication, excessive privileges, or weak lifecycle management can allow attackers to gain and maintain access.

Outcome 1

Understand authentication mechanisms and identity verification methods.

Outcome 2

Apply access control models such as RBAC and ABAC effectively.

Outcome 3

Manage identity lifecycle and enforce governance policies.

Figures

Authentication Flow

Identify
Authenticate
Authorize
Access

Access Control Models

RBAC

Access based on roles assigned to users.

ABAC

Access based on attributes and context.

MAC/DAC

System vs owner-controlled access decisions.

Case Examples

Credential Theft

Attackers obtain passwords via phishing and access systems.

  • MFA reduces risk
  • Monitor anomalies

Privilege Escalation

User gains higher permissions than intended.

  • Apply least privilege
  • Review access regularly

Glossary (50 Terms)

#TermDefinition
1IdentityA unique digital representation of a user, system, or service that enables authentication, authorization, and accountability within an information system environment.
2AuthenticationThe process of verifying a claimed identity using credentials such as passwords, tokens, or biometrics before granting access to systems or data.
3AuthorizationThe process of determining what actions an authenticated identity is allowed to perform, based on policies, roles, or contextual attributes.
4Access ControlA set of mechanisms and policies that restrict access to resources, ensuring only authorized users or systems can perform specific actions.
5MFAMulti-factor authentication requires multiple independent credentials, such as something you know, have, or are, significantly improving resistance to credential theft attacks.
6RBACRole-Based Access Control assigns permissions based on predefined roles within an organization, simplifying management and ensuring consistent access rights aligned with job functions.
7ABACAttribute-Based Access Control evaluates multiple attributes such as user role, device, time, and location to dynamically determine whether access should be granted.
8Least PrivilegeA security principle ensuring users and systems receive only the minimum permissions necessary to perform tasks, reducing potential damage from misuse or compromise.
9ProvisioningThe process of creating user accounts and assigning appropriate roles and permissions based on job responsibilities and organizational policies.
10DeprovisioningThe process of removing user accounts and revoking access rights when they are no longer required, such as after role changes or termination.
11Identity LifecycleThe complete management process of identities from creation and maintenance to eventual removal, ensuring access rights remain appropriate over time.
12SSOSingle Sign-On allows users to authenticate once and access multiple systems without re-entering credentials, improving usability while requiring strong security controls.
13FederationAn identity management approach that enables multiple organizations or systems to share authentication information through trusted relationships and standardized protocols.
14KerberosA network authentication protocol that uses tickets and symmetric cryptography to securely verify identities without transmitting passwords over the network.
15SAMLSecurity Assertion Markup Language is a standard for exchanging authentication and authorization data between identity providers and service providers in federated environments.
16OAuthAn authorization framework that allows applications to access user resources on another service without exposing user credentials directly.
17OpenID ConnectAn authentication protocol built on OAuth that verifies user identity and provides standardized identity information to applications.
18Privileged AccountAn account with elevated permissions capable of modifying system configurations, managing users, or accessing sensitive data, requiring strict monitoring and controls.
19PAMPrivileged Access Management focuses on securing, monitoring, and controlling privileged accounts to reduce the risk of misuse or compromise.
20Directory ServiceA centralized system that stores identity information, authentication data, and access permissions for users and devices within an organization.
21BiometricsAn authentication method using unique physical or behavioral characteristics such as fingerprints, facial recognition, or voice patterns to verify identity.
22TokenA physical or digital device used to generate or store authentication credentials, often as part of multi-factor authentication systems.
23Password PolicyA set of rules defining password complexity, length, expiration, and reuse to reduce the risk of weak or compromised credentials.
24Session ManagementThe process of securely maintaining user sessions after authentication, including handling session tokens, timeouts, and protection against hijacking attacks.
25Access ReviewA periodic process of evaluating user permissions to ensure access rights remain appropriate and aligned with current roles and responsibilities.
26Identity ProviderA system responsible for authenticating users and issuing identity assertions that can be used by other systems for access decisions.
27Service ProviderAn application or system that relies on an external identity provider to authenticate users and grant access to its resources.
28Adaptive AuthenticationAn authentication approach that dynamically adjusts required security measures based on contextual risk factors such as location or device.
29Account LockoutA security control that disables an account after a number of failed login attempts to prevent brute force attacks.
30Credential ManagementThe processes and tools used to securely store, manage, and protect authentication credentials throughout their lifecycle.
31Zero TrustA security model that assumes no implicit trust and requires continuous verification of identity and context for every access request.
32Identity GovernanceA framework ensuring identity and access management processes comply with policies, regulations, and business requirements through oversight and controls.
33ACLAn Access Control List specifies which users or systems have access to a resource and defines the permitted actions for each entity.
34Role EngineeringThe process of designing and defining roles and associated permissions within an organization to support efficient and secure access control.
35Identity AssuranceThe level of confidence that an identity has been correctly verified, often based on the strength of authentication methods used.
36Identity VerificationThe process of confirming an individual’s real-world identity before granting access to systems or sensitive information.
37Authentication ServerA system responsible for validating user credentials and confirming identity during login attempts.
38Authorization ServerA system that issues access tokens and enforces access control policies for authenticated users.
39Access TokenA credential issued after authentication that allows a user or system to access protected resources for a limited time.
40Federated IdentityAn identity management approach that enables users to authenticate across multiple systems using a single identity provider.
41Single Factor AuthenticationAn authentication method using only one type of credential, typically a password, which provides lower security compared to multi-factor approaches.
42Strong AuthenticationAn authentication method using multiple or high-assurance factors to significantly reduce the likelihood of unauthorized access.
43Credential StuffingAn attack where stolen credentials from one service are reused to gain unauthorized access to other systems.
44Brute Force AttackAn attack method that systematically attempts many password combinations until the correct one is found.
45Session HijackingAn attack where an attacker takes over an active user session to gain unauthorized access to a system.
46Identity StoreA repository that contains user credentials, identity attributes, and authentication data used by identity management systems.
47Access PolicyA set of rules defining who can access resources and under what conditions, based on organizational security requirements.
48DelegationThe process of granting authority to another user or system to perform actions on behalf of an identity.
49Separation of DutiesA security principle that divides responsibilities among multiple individuals to reduce the risk of fraud or unauthorized actions.
50Identity Federation ProtocolA standardized protocol such as SAML or OAuth that enables secure sharing of identity and authentication information across systems.