Editor's note
When someone knocks on your door at home, it's unlikely you'll let them in sight unseen. You may peek out the window first to see if you recognize them. If it’s an unknown visitor purporting to represent a legitimate entity, such as a repairman, you might verify their identity before granting entry and then restrict which parts of the house they can access. The same caution and discretion is needed to properly protect physical and digital assets in the enterprise. But instead of a window or door, on-premises and cloud identity and access management systems help infosec pros get the job done.
In this Security School, based on (ISC)² CISSP training material on Domain 5 of the exam, find out how to control physical and logical access to resources, manage identification and authentication, deploy cloud identity and access management services, avoid access control attacks and more. In his two-part tip series, expert Adam Gordon provides a deep dive into different types of access control attacks and ways to avert or mitigate these threats in the enterprise. Preventing this type of malicious activity requires strong password policies and practices, he explains. In his video, Gordon walks viewers through how to integrate third-party cloud identity and access management services into their enterprise security strategy.
Once you've reviewed the parts of this Security School on these core concepts of Domain 5, take the quiz to see how much you have learned about identity and access management systems and best practices.
View our Security School Course Catalog to view more schools.
CISSP® is a registered mark of (ISC)², Inc.
1A closer look at on-prem and cloud identity and access management
People and devices shouldn’t have unrestricted access to enterprise resources Domain 5 of the CISSP exam assesses your understanding of on-premises and cloud identity and access management systems and how they can be used to prevent unauthorized access to resources and applications.
-
Article
Learn how to identify and prevent access control attacks
Once an attacker has gained entry to a network, the consequences can be severe. Find out how the right access control tools can help prevent that from happening. Read Now
-
Article
CISSP Domain 5 quiz: Types of access control systems
Get ready for the CISSP exam with this 10-question practice quiz covering key concepts in Domain 5, including access control, identity, authentication and more. Read Now