Identity and Access Management (IAM)

Part of the CompTIA Security+ SY0-701 Study Guide

🔐 IAM Overview

IAM is the discipline for managing user identities and their permissions. It includes provisioning, authentication, authorization, and auditing. Learn more about IAM on Wikipedia.

👤 Authentication Factors

Authentication factors are the methods used to verify a user's identity. They are categorized into five main types, each providing a layer of security. Combining multiple factors (multi-factor authentication) significantly enhances security.

Multi-factor authentication (MFA) combines two or more of these factors to provide stronger security. For example, a user might log in with a password (something you know) and a one-time code sent to their phone (something you have).

📋 IAM Lifecycle

  1. Identify: Assign identity. Learn more about identity management on Wikipedia.
  2. Authenticate: Verify identity. Learn more about authentication on Wikipedia.
  3. Authorize: Grant specific access. Learn more about authorization on Wikipedia.
  4. Audit: Log and review access. Learn more about auditing on Wikipedia.

🔏 Access Control Models

Access control models define how permissions are granted to users, groups, or systems to access resources. These models are critical for ensuring that sensitive data and systems are protected from unauthorized access. Below are the key access control models used in modern security frameworks:

Choosing the right access control model depends on the organization's security requirements, regulatory compliance needs, and operational complexity. Combining these models can provide a layered approach to access control.

🔗 Federation, SSO & PAM

🧰 IAM Tools & Protocols

Identity and Access Management (IAM) relies on various tools and protocols to ensure secure authentication, authorization, and identity federation. Below are key tools and protocols used in IAM systems:

These tools and protocols form the backbone of modern IAM systems, enabling secure and efficient management of user identities and access permissions.