## What is Identity and Access Management (IAM)? - Framework of policies, technologies, and processes - Often implemented by Cloud Providers --- ## Foundational Principles - **Authentication** - **Authorization** - **Single Sign-On (SSO)** --- ## Governance Strategies - **Role-Based Access Control (RBAC)** - **Attribute-Based Access Control (ABAC)** - **Policy Management** --- ## Role-Based Access Control (RBAC) - Assigns permissions based on roles - Simplifies access management - Ensures consistent policy enforcement --- ## Attribute-Based Access Control (ABAC) - Grants access based on user attributes - More granular and dynamic control - Flexible compared to RBAC --- ## Policy Management - Defines and enforces access policies - Policies can be applied to both users and systems --- ## Operational Tactics - **Provisioning and De-Provisioning** - **Audit and Monitoring** --- ## Provisioning and De-Provisioning - Automates granting and revoking access - Ensures appropriate access lifecycle - Reduces risk of orphaned accounts --- ## Audit and Monitoring - Tracks user activities and access - Detects and responds to suspicious behavior - Ensures compliance with policies --- ## The Components of IAM 1. **Identity Repository** 2. **Authentication Mechanisms** 3. **Authorization Frameworks** 4. **Provisioning and De-Provisioning Systems** 5. **Audit and Compliance Tools** --- ## Identity Repository - Centralized database for user identities - Stores credentials and attributes - Ensures scalable and secure management --- ## Authorization Mechanisms - **RBAC:** Role-based permissions - **ABAC:** Attribute-based permissions - **ACLs:** Access control lists --- ## Provisioning and De-Provisioning Systems - Automates access lifecycle - Manages user roles and permissions --- ## Audit and Compliance Tools - **Activity Logging:** Records user actions - **Usage Monitoring:** Tracks resource usage - **Audit Trails:** Forensic event records --- ## Conclusion - **Cornerstone of Cybersecurity:** Manages digital identities and access - **Enhances Security and Compliance:** Ensures only authorized access - **Supports Operational Efficiency:** Centralizes and automates access processes - **Compliance:** Meets regulatory standards like GDPR, HIPAA, PCI DSS