CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass
Showing posts with label Authorization. Show all posts
Showing posts with label Authorization. Show all posts

Wednesday, October 9, 2024

Identity and Access Management

 IAM (Identity and Access Management)

A modern access control system is usually implemented through an Identity and Access Management (IAM) system, which consists of four critical processes: identification (creating a unique user account), authentication (proving a user's identity), authorization (defining what access a user has to resources), and accounting (tracking user activity and alerting on suspicious behavior); essentially ensuring the right people have access to the correct information at the right time while monitoring their actions for security purposes.

Explanation of each process:

Identification:

This initial step involves creating a unique identifier for a user, device, or process on a network, like a username or an account number, so that the system can recognize them.

Authentication:

This process verifies that the user is who they claim to be by checking credentials like passwords, security tokens, or biometric data when they attempt to access a resource.

Authorization:

Once authenticated, the system determines the user's level of access to specific resources based on their assigned permissions, which can be managed through different models, such as discretionary (owner-defined) or mandatory (system-enforced).

Accounting:

This final stage involves recording user activity, including what resources they accessed, when, and any potential anomalies, providing an audit trail for security purposes.

Key points to remember:

Multi-factor authentication:

Modern IAM systems often incorporate multiple authentication factors (like a password and a code sent to your phone) for enhanced security.

Centralized management:

IAM systems typically manage user identities and access rights from a single platform, simplifying administration.

Compliance requirements:

IAM systems are crucial in meeting data privacy and security regulations by controlling who can access sensitive information.