When someone knocks on your door at home, it's unlikely you'll let them in sight unseen. You may peek out the window first to see if you recognize them. If it’s an unknown visitor purporting to represent a legitimate entity, such as a repairman, you might verify their identity before granting entry and then restrict which parts of the house they can access. The same caution and discretion is needed to properly protect physical and digital assets in the enterprise. But instead of a window or door, on-premises and cloud identity and access management systems help infosec pros get the job done.
In this Security School, based on (ISC)² CISSP training material on Domain 5 of the exam, find out how to control physical and logical access to resources, manage identification and authentication, deploy cloud identity and access management services, avoid access control attacks and more. In his two-part tip series, expert Adam Gordon provides a deep dive into different types of access control attacks and ways to avert or mitigate these threats in the enterprise. Preventing this type of malicious activity requires strong password policies and practices, he explains. In his video, Gordon walks viewers through how to integrate third-party cloud identity and access management services into their enterprise security strategy.
Once you've reviewed the parts of this Security School on these core concepts of Domain 5, take the quiz to see how much you have learned about identity and access management systems and best practices.
View our Security School Course Catalog to view more schools.
CISSP® is a registered mark of (ISC)², Inc.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
A closer look at on-prem and cloud identity and access management
People and devices shouldn’t have unrestricted access to enterprise resources Domain 5 of the CISSP exam assesses your understanding of on-premises and cloud identity and access management systems and how they can be used to prevent unauthorized access to resources and applications.
Once an attacker has gained entry to a network, the consequences can be severe. Find out how the right access control tools can help prevent that from happening. Continue Reading
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading
Get ready for the CISSP exam with this 10-question practice quiz covering key concepts in Domain 5, including access control, identity, authentication and more. Continue Reading