Security School

Get started Bring yourself up to speed with our introductory content.

CISSP Domain 5: Cloud identity management and access control

Knock, knock. Who's there? Identity management and access control best practices, which every infosec pro needs to understand before users -- or attackers -- come knocking.

Introduction

When someone knocks on your door at home, it's unlikely you'll let them in sight unseen. You may peek out the window first to see if you recognize them. If it’s an unknown visitor purporting to represent a legitimate entity, such as a repairman, you might verify their identity before granting entry and then restrict which parts of the house they can access. The same caution and discretion is needed to properly protect physical and digital assets in the enterprise. But instead of a window or door, on-premises and cloud identity and access management systems help infosec pros get the job done.

In this Security School, based on (ISC)² CISSP training material on Domain 5 of the exam, find out how to control physical and logical access to resources, manage identification and authentication, deploy cloud identity and access management services, avoid access control attacks and more. In his two-part tip series, expert Adam Gordon provides a deep dive into different types of access control attacks and ways to avert or mitigate these threats in the enterprise. Preventing this type of malicious activity requires strong password policies and practices, he explains. In his video, Gordon walks viewers through how to integrate third-party cloud identity and access management services into their enterprise security strategy.

Once you've reviewed the parts of this Security School on these core concepts of Domain 5, take the quiz to see how much you have learned about identity and access management systems and best practices.  

View our Security School Course Catalog to view more schools.

CISSP® is a registered mark of (ISC)², Inc.

1Learning links-

A closer look at on-prem and cloud identity and access management

People and devices shouldn’t have unrestricted access to enterprise resources Domain 5 of the CISSP exam assesses your understanding of on-premises and cloud identity and access management systems and how they can be used to prevent unauthorized access to resources and applications.

Tip

Learn how to identify and prevent access control attacks

Once an attacker has gained entry to a network, the consequences can be severe. Find out how the right access control tools can help prevent that from happening. Continue Reading

Video

Identity and access management in the cloud: Risk or reward?

In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading

Quiz

CISSP Domain 5 quiz: Types of access control systems

Get ready for the CISSP exam with this 10-question practice quiz covering key concepts in Domain 5, including access control, identity, authentication and more. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close