BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Learn how to identify and prevent access control attacks
Once an attacker has gained entry to a network, the consequences can be severe. Find out how the right access control tools can help prevent that from happening. Read Now
When someone knocks on your door at home, it's unlikely you'll let them in sight unseen. You may peek out the window first to see if you recognize them. If it’s an unknown visitor purporting to represent a legitimate entity, such as a repairman, you might verify their identity before granting entry and then restrict which parts of the house they can access. The same caution and discretion is needed to properly protect physical and digital assets in the enterprise. But instead of a window or door, on-premises and cloud identity and access management systems help infosec pros get the job done.
In this Security School, based on (ISC)² CISSP training material on Domain 5 of the exam, find out how to control physical and logical access to resources, manage identification and authentication, deploy cloud identity and access management services, avoid access control attacks and more. In his two-part tip series, expert Adam Gordon provides a deep dive into different types of access control attacks and ways to avert or mitigate these threats in the enterprise. Preventing this type of malicious activity requires strong password policies and practices, he explains. In his video, Gordon walks viewers through how to integrate third-party cloud identity and access management services into their enterprise security strategy.
Once you've reviewed the parts of this Security School on these core concepts of Domain 5, take the quiz to see how much you have learned about identity and access management systems and best practices.
View our Security School Course Catalog to view more schools.
CISSP® is a registered mark of (ISC)², Inc.