TrailBlaze Adventures · CISSP Domain 5 Case

Identity and Access Management

A classroom and workshop case about identities, authentication, authorization, privileged access, federation, and access governance in a global adventure travel platform.

Scenario — TrailBlaze Adventures Identity Sprawl and Access Control Challenge

TrailBlaze Adventures operates a global digital ecosystem where customers, guides, employees, local partners, suppliers, support agents, and administrators all need different types of access.

As the company expanded rapidly, identity and access management became fragmented. Different regions created their own accounts, partner portals, admin groups, and access practices. Some users authenticate through the central identity provider, while others still use local accounts or partner-managed credentials.

Current IAM concerns

  • Some regional partners still use shared accounts to access the partner portal.
  • MFA is required for administrators but optional for guides and support staff.
  • Role definitions are inconsistent between regions and business units.
  • Former seasonal guides sometimes retain mobile-app access after contracts end.
  • Privileged access to cloud consoles and production databases is not consistently monitored.

Business pressure

  • TrailBlaze wants fast onboarding for temporary guides during peak travel seasons.
  • Partners need limited access without complex account administration.
  • Customers expect easy login, social sharing, and account recovery.
  • Support teams need enough access to help travelers during emergencies.
  • Security teams want stronger access control without blocking field operations.
Management request: “Design an IAM approach that supports global users, temporary guides, partners, and administrators while reducing account takeover, privilege misuse, and unauthorized access.”

Student assignment

1

Investigate the case

Analyze the TrailBlaze IAM scenario and identify key challenges related to identity and access management.

  • Which user groups and system identities exist in the environment?
  • Which users require strong authentication or multi-factor authentication?
  • Where do permissions appear excessive, unclear, or inconsistent?
  • Which identities need lifecycle controls for onboarding, role changes, and offboarding?
  • Where should privileged access management, federation, or access reviews be applied?
2

Identify Domain 5 challenges

Group your findings under authentication, authorization, access control models, identity lifecycle, privileged access, federation, and access governance.

3

Link challenges to Domain 5 concepts

Connect each identified challenge to CISSP Domain 5 concepts and explain why that concept is relevant for managing TrailBlaze identities securely.

Deliverable: A structured list of at least 10 IAM challenges, each linked to one or more Domain 5 concepts.

Domain 5 challenges to investigate

Authentication and Account Takeover

  • MFA is not consistently required for guides, support staff, and partners.
  • Customer accounts are exposed to credential stuffing because reused passwords are common.
  • Account recovery workflows may allow social engineering against support teams.

Authorization and Access Models

  • Roles differ between regions, creating inconsistent access rights.
  • Support agents may have broader access to customer data than required.
  • Partner access is not consistently limited to necessary itinerary and logistics data.

Identity Lifecycle Management

  • Seasonal guides need fast onboarding and reliable offboarding.
  • Former contractors may retain access after contracts end.
  • Role changes are not always reflected in permissions quickly.

Privileged Access

  • Cloud administrators and DevOps engineers have powerful access to production systems.
  • Privileged actions are not always logged, reviewed, or approved.
  • Emergency access may bypass normal controls without sufficient oversight.

Federation and Partner Identity

  • Some local partners use shared accounts instead of named identities.
  • Partner-managed identities are not consistently trusted or verified.
  • Federated access could simplify partner onboarding but introduces trust dependencies.

Access Governance

  • Access reviews are irregular and mostly manual.
  • There is no clear evidence that users still need their assigned permissions.
  • Identity governance is not yet integrated with compliance and audit requirements.

Link challenges to Domain 5 concepts

Students must connect each identified challenge to CISSP Domain 5 concepts.

ChallengeDomain 5 ConceptExplanation
MFA is optional for guides and support staffMulti-Factor Authentication / Strong AuthenticationUsers with access to sensitive customer or operational data require stronger authentication to reduce account takeover risk.
Customers reuse passwords across platformsCredential Management / Credential StuffingCredential stuffing attacks exploit reused passwords, so monitoring, MFA, and password protections are needed.
Support agents have broad customer-data accessLeast Privilege / Role-Based Access ControlSupport roles should only receive permissions necessary for specific support tasks.
Regional roles are inconsistentRole Engineering / RBACRoles must be standardized and designed around business functions to avoid privilege drift.
Partners use shared accountsIdentification / AccountabilityShared accounts prevent reliable accountability because actions cannot be linked to a specific person.
Partner access depends on external organizationsFederated Identity / Identity ProviderFederation can support partner access but requires trust in external identity providers and clear governance.
Former seasonal guides retain accessDeprovisioning / Identity LifecycleAccess must be removed when users leave or contracts end to prevent unauthorized use.
Guides need different access based on trip contextAttribute-Based Access ControlAccess can depend on attributes such as assigned trip, region, time, role, and device.
Cloud admins have powerful production accessPrivileged Access ManagementPrivileged accounts require approval, monitoring, session recording, and strict access controls.
Emergency access bypasses normal controlsAccess Governance / Audit TrailEmergency access may be necessary but must be logged, reviewed, and justified afterward.
Access reviews are manual and irregularAccess Review / Identity GovernancePeriodic reviews verify that users still require their permissions and support compliance evidence.
Users access multiple platforms separatelySingle Sign-On / Identity FederationSSO can improve usability and centralize authentication controls across TrailBlaze systems.

Learning outcomes

Outcome 1

Analyze identities

Identify human, partner, administrative, and system identities in a complex global platform.

Outcome 2

Apply authentication controls

Determine where MFA, adaptive authentication, credential protections, and account recovery controls are needed.

Outcome 3

Design authorization

Apply RBAC, ABAC, least privilege, and need-to-know principles to practical access decisions.

Outcome 4

Govern access

Plan identity lifecycle, privileged access management, access reviews, and federation controls.

Instructor tip

Use this case in three phases:

Phase 1

Map identities

Students identify all user groups, service accounts, partner identities, and privileged accounts.

Phase 2

Analyze access

Students decide which access model fits each group and where MFA or PAM is required.

Phase 3

Design IAM controls

Students propose lifecycle workflows, access reviews, federation rules, and privileged access governance.