Webinar 1.1 - Identity & Access Management
Webinar 1.1 - Identity & Access Management
Webinar 1.1 - Identity & Access Management
SkillsBuild Partner
JUNIO, 2023
CompTIA Security+
❑ ¿Cada cuánto expira la certificación?
❑ ¿Cómo se puede renovar?
❑ ¿Con qué nota se aprueba?
❑ ¿Cantidad de preguntas?
❑ ¿Cómo se distribuyen las preguntas
según el contenido?
❑ ¿Con qué plataforma se hace el examen?
❑ ¿Cuánto dura el examen?
❑ IT Certification Roadmap
AS
CompTIA Security+
❑ Credencial permanece 3 años vigente desde que se
aprueba.
AS
“ Identity and Access Management is a fundamental and critical
cybersecurity capability, to ensure the right people and things have the
right access to the right resources at the right time”
AS
What is Identity & Access Management?
PM
⧫ Establishing unique identities and associated authentication credentials.
⧫ Onboarding these identities into target applications, systems, and platforms.
⧫ Provisioning and de-provisioning new user accounts.
Identity ⧫ Managing identity data and credentials (e.g., self-service password reset).
management
⧫ Creating workflow processes for approving account creation and modification.
⧫ Providing the ability to modify, suspend, or remove accounts.
⧫ Auditing and reporting user identity information.
PM
Identification: Claiming to be an Authentication: Proving that you are
identity when attempting to access a that identity
secured area or system
AS
What is Two-Factor Authentication (2FA)?
What is Multi-Factor Authentication (MFA)?
What is Single Sign-On (SSO)?
AS
AS
MFA factors and
attributes
Factors
• Something you know, such as passwords, PINs,
or even secret locks.
• Something you have, such as a key or smart card.
• Something you are, such as biometric verification
(fingerprint, retina scan, or voice recognition).
Attributes
• Somewhere you are, like geolocation
• Something you can do, like gestures or touches.
• Something you exhibit, like the way you walk.
• Someone you know, like a web of trust in
certificates
AS
Authentication methods
Directory services
Federation
Cloud-based security
• Third-party can manage the platform
• Centralized platform
• Automation options with API integration
• May include additional options (for a cost)
PM
Biometrics
Gait analysis
Efficacy rates
PM
If you want to make sure all legitimate users do not
experience trouble during scans, then some
unauthorized users will get accepted (false
positives) because they will be interpreted by the
system as being on the wrong curve based on
where the threshold is set.
AS
Account policies
Time-based
Geofencing Geotagging Geolocation Access policies
logins
Impossible
Account
Account audits travel Lockout Disablement
permissions
time/risky login
AS
Password management in Microsoft Windows
AS
Account types
User account
Account credentials of a single individual. Each user is generally given a user ID—a unique
alphanumeric identifier they will use to identify themselves when logging in or accessing the
system.
Guest accounts
Used on corporate networks to provide visitors access to the Internet and to some common
corporate resources, such as projectors, printers in a conference room
Service accounts
Used to run processes that do not require human intervention to start, stop, or administer
AS
User account provisioning
and de-provisioning
• Adding, removing, and updating
individuals and their roles in a system
• Assigning levels of access to individuals or
groups of individuals
PM
Protecting the sensitive data within the system and
securing the system itself.
PM
Access control scheme
ACL is nothing more than a list that contains the subjects that have access
rights to a particular object. The list identifies not only the subject, but the
specific access granted to the subject for the object
Object Subject
PM
Access control schemes
AS
Importance of policies to organizational security
Personnel
• Acceptable use policy
• Job rotation
• Mandatory vacation
• Separation of duties
• Least privilege
• Clean desk space
• Background checks
• Non-disclosure agreement (NDA)
• Social media analysis
• Onboarding
• Offboarding
• User training
PM
IAM tools
PM