CISSP D5 Slides1
CISSP D5 Slides1
CISSP D5 Slides1
2
Course Agenda (continued)
3
Domain 5
Identity and Access Management (IAM)
4
Domain Objectives
1. Identify standard terms for applying physical and logical access
controls to environments related to their security practice.
2. Apply physical and logical access controls to environments with
relation to the (environment’s or access controls’) security practice.
3. Define the process of user and systems access review.
4. Apply the appropriate control types/categories for provisioning
and deprovisioning of identities.
5. Classify various identification, authentication, and authorization
technologies and for use in managing people, devices, and
services.
5
Domain Objectives (continued)
6. Differentiate the languages and protocols that are related
to roles and systems that support federation.
7. Select the appropriate technologies and protocols for
establishing a federated environment that satisfies
business requirements.
8. Appraise various access control models to meet business
security requirements.
9. Name the significance of accountability in relationship
to identification, authentication, and auditing.
6
Domain Agenda
7
Domain Agenda (continued)
Accountability
Domain Review
8
Module 1
Control Physical and Logical Access to Assets
9
Module Objectives
10
Systems
11
Logical and Physical Access Control Systems
Physical Logical
Access Control Access Control
12
Devices
• Hardware/software
• Access control tokens
• Biometric readers
13
Facilities Case: Department of Homeland Security
1. What distinct roles can you locate within the physical access
control systems (PACS) application’s four areas? What are
general security roles that can be used as placeholders for the
PACS application roles?
2. Name the logical or physical systems that are described in the
PACS application.
3. What assumptions could you make about the nature of the
information related to identification in the PACS application
cited below?
14
Module 2
Identity and Access Provisioning Lifecycle
15
Module Objectives
16
User Access Review
17
System Account Access Review
18
Provisioning and Deprovisioning
19
Activity: Identify the Roles and Control Types and Categories of
INSTRUCTIONS
Working together in small teams, answer the questions below.
• What additional controls (choose from the CIA triad) could be
added to each of the three phases of the process flow?
o Add control types
o Add control categories
• What roles can you identify in the process flow (i.e., Custodian,
Data Owner, etc.)?
20
Module 3
Identification and Authentication of People, Devices,
and Services
21
Module Objectives
22
Identity Management Implementation
Identification Authentication
Authorization Accountability
23
Session Management
24
Registration and Proofing of Identity
NIST SP 800-63-3 contains three levels of assurance for digital
identities:
IAL1: Self-asserted
25
Module 4
Identity Management Implementation
26
Module Objectives
27
Federated Identity Management (FIM)
• Federated Identity Management (FIM) is specified and sought
for use between different organizations or entities that need
to share resources or have users in common.
• Services that provide federation:
o Security Assertion Markup Language (SAML)
o Open Authorization (OAuth)
28
Security Assertion Markup Language (SAML) Roles
Roles:
• Identity provider (IdP)
• Service provider/relying party
• User/principal
29
Security Assertion Markup Language (SAML)
Components
Components:
• Assumptions
• Bindings
• Protocols
• Profiles
30
Open Authentication
Roles:
Authorization
Resource owner
server
31
Integrate Identity Management as a Third-
Party Service
• On-Premise
• Cloud
32
Activity: Select the Appropriate Components for a Federated
INSTRUCTIONS
As a team, reflect upon and discuss actual business needs within your
corporation.
• Each team should allow every participant to relate business needs within each company.
• Instead of contributing to or jumping to a conclusion on what solution there might be, each
participant should ask deeper questions of the presenter to uncover additional insights into the
environment.
• Expose assumptions by asking “why” a thing is so or to give an example of a statement shared.
• Create a business case for utilizing either OAuth or SAML or both. What are actual business
drivers?
• Also select if it should be solved on-premise or in the cloud and why.
• Create analogous connections between the roles in SAML and OAuth.
33
Module 5
Implement and Manage Authorization Mechanisms
34
Module Objectives
35
Types of Access Control
36
Activity: Select the Appropriate Access Control Type (Rule, Role,
37
Module 6
Accountability
38
Module Objectives
39
Accountability
40
Module 7
Domain Review
41
Domain Summary
42
Domain Review Questions
1. What are the two primary types of access control systems and
what is one way that access control systems are maintained?
43
Answer
44
Domain Review Questions
45
Answer
46
Domain Review Questions
47
Answer
48
Domain Review Questions
49
Answer
50
Domain Review Questions
A. IAL1
B. IAL 2
C. IAL 3
D. None of the above
51
Answer
52
Domain Review Questions
A. Accountability
B. Noninterference
C. Spoliation
D. Subsystem
53
Answer
54
Domain Review Questions
7. How does system account review differ from user account review?
55
Answer
56
Domain Review Questions
57
Answer
58
Domain Review Questions
59
Answer
60
Domain Review Questions
62