CompTIA Security+
1 Threats, Attacks, and Vulnerabilities
1-1 Types of Threats
1-2 Types of Attacks
1-3 Vulnerabilities
1-4 Threat Actors and Motives
1-5 Threat Intelligence
1-6 Incident Response
1-7 Penetration Testing
1-8 Vulnerability Scanning
1-9 Threat Modeling
1-10 Security Controls
2 Technologies and Tools
2-1 Firewalls
2-2 Intrusion Detection Systems (IDS)
2-3 Intrusion Prevention Systems (IPS)
2-4 Security Information and Event Management (SIEM)
2-5 Data Loss Prevention (DLP)
2-6 Security Orchestration, Automation, and Response (SOAR)
2-7 Endpoint Security
2-8 Network Security
2-9 Cloud Security
2-10 Mobile Device Security
2-11 Secure Coding Practices
2-12 Cryptography
2-13 Public Key Infrastructure (PKI)
2-14 Certificate Management
2-15 Security Tools and Utilities
3 Architecture and Design
3-1 Security Models
3-2 Security Controls
3-3 Secure Network Design
3-4 Secure Systems Design
3-5 Secure Application Design
3-6 Secure Cloud Architecture
3-7 Secure Mobile Architecture
3-8 Secure IoT Architecture
3-9 Secure Data Storage
3-10 Secure Backup and Recovery
3-11 Security in DevOps
3-12 Security in Agile Development
3-13 Security in Continuous IntegrationContinuous Deployment (CICD)
3-14 Security in Configuration Management
3-15 Security in Identity and Access Management (IAM)
4 Identity and Access Management
4-1 Authentication Methods
4-2 Authorization Mechanisms
4-3 Identity and Access Management (IAM) Concepts
4-4 Single Sign-On (SSO)
4-5 Multi-Factor Authentication (MFA)
4-6 Federation
4-7 Role-Based Access Control (RBAC)
4-8 Attribute-Based Access Control (ABAC)
4-9 Identity as a Service (IDaaS)
4-10 Identity Lifecycle Management
4-11 Access Reviews and Audits
4-12 Privileged Access Management (PAM)
4-13 Identity Federation
4-14 Identity Provisioning and Deprovisioning
5 Risk Management
5-1 Risk Management Concepts
5-2 Risk Assessment
5-3 Risk Mitigation Strategies
5-4 Business Impact Analysis (BIA)
5-5 Risk Register
5-6 Risk Treatment
5-7 Risk Monitoring and Reporting
5-8 Risk Appetite and Tolerance
5-9 Risk Communication
5-10 Risk Transfer
5-11 Risk Acceptance
5-12 Risk Avoidance
5-13 Risk Reduction
5-14 Risk in Cloud Environments
5-15 Risk in Mobile Environments
5-16 Risk in IoT Environments
6 Cryptography and PKI
6-1 Cryptographic Concepts
6-2 Symmetric Encryption
6-3 Asymmetric Encryption
6-4 Hashing
6-5 Digital Signatures
6-6 Public Key Infrastructure (PKI)
6-7 Certificate Management
6-8 Certificate Authorities (CAs)
6-9 Certificate Revocation
6-10 Key Management
6-11 Cryptographic Protocols
6-12 Cryptographic Attacks
6-13 Quantum Cryptography
6-14 Post-Quantum Cryptography
6-15 Cryptographic Use Cases
7 Security Operations
7-1 Security Operations Concepts
7-2 Security Policies and Procedures
7-3 Security Awareness and Training
7-4 Security Monitoring and Logging
7-5 Incident Response
7-6 Forensics
7-7 Disaster Recovery
7-8 Business Continuity
7-9 Physical Security
7-10 Personnel Security
7-11 Supply Chain Security
7-12 Third-Party Risk Management
7-13 Security Audits and Assessments
7-14 Compliance and Regulatory Requirements
7-15 Security Metrics and Reporting
7-16 Security Operations Center (SOC)
7-17 Security Orchestration, Automation, and Response (SOAR)
7-18 Security in DevOps
7-19 Security in Agile Development
7-20 Security in Continuous IntegrationContinuous Deployment (CICD)
4.11 Access Reviews and Audits Explained

4.11 Access Reviews and Audits Explained

Key Concepts

Access Reviews and Audits are essential processes in Identity and Access Management (IAM) that ensure the accuracy and security of user permissions. Key concepts include Access Reviews, Access Audits, Role-Based Access Control (RBAC), and Compliance.

Access Reviews

Access Reviews involve periodic assessments of user permissions to ensure that they are appropriate and up-to-date. These reviews help identify and remove unnecessary or excessive permissions, reducing the risk of unauthorized access.

Example: A company conducts quarterly access reviews for its employees. During a review, the IT department checks each employee's access rights to various systems and applications. If an employee no longer needs access to a particular system, their permissions are revoked to maintain security.

Access Audits

Access Audits are comprehensive evaluations of access control policies, procedures, and implementations. These audits verify that access controls are functioning as intended and are in compliance with organizational policies and regulatory requirements.

Example: An external auditor conducts an annual access audit for a financial institution. The auditor reviews the institution's access control policies, logs, and user permissions to ensure that they meet industry standards and regulatory requirements, such as those set by the Financial Industry Regulatory Authority (FINRA).

Role-Based Access Control (RBAC)

RBAC is a method of regulating access to resources based on the roles of individual users within an organization. Roles are defined based on job functions, and permissions are assigned to roles rather than individual users. Access reviews and audits often focus on ensuring that roles and permissions are correctly aligned with job responsibilities.

Example: In a hospital, doctors, nurses, and administrative staff have different roles. During an access review, the IT department ensures that doctors have access to patient medical records, while nurses can view but not modify certain records, and administrative staff have access to billing information but not medical records.

Compliance

Compliance refers to adherence to laws, regulations, guidelines, and specifications relevant to an organization's operations. Access reviews and audits are crucial for ensuring that an organization's access control practices meet regulatory requirements and industry standards.

Example: A healthcare organization must comply with the Health Insurance Portability and Accountability Act (HIPAA). Regular access reviews and audits help ensure that patient data is protected according to HIPAA regulations, such as limiting access to authorized personnel only.

Conclusion

Access Reviews and Audits are vital for maintaining the security and integrity of an organization's access control systems. By conducting regular reviews and audits, organizations can ensure that user permissions are appropriate, access controls are effective, and compliance requirements are met. This proactive approach helps prevent unauthorized access and reduces the risk of data breaches.