CompTIA Security+
1 Threats, Attacks, and Vulnerabilities
1-1 Types of Threats
1-2 Types of Attacks
1-3 Vulnerabilities
1-4 Threat Actors and Motives
1-5 Threat Intelligence
1-6 Incident Response
1-7 Penetration Testing
1-8 Vulnerability Scanning
1-9 Threat Modeling
1-10 Security Controls
2 Technologies and Tools
2-1 Firewalls
2-2 Intrusion Detection Systems (IDS)
2-3 Intrusion Prevention Systems (IPS)
2-4 Security Information and Event Management (SIEM)
2-5 Data Loss Prevention (DLP)
2-6 Security Orchestration, Automation, and Response (SOAR)
2-7 Endpoint Security
2-8 Network Security
2-9 Cloud Security
2-10 Mobile Device Security
2-11 Secure Coding Practices
2-12 Cryptography
2-13 Public Key Infrastructure (PKI)
2-14 Certificate Management
2-15 Security Tools and Utilities
3 Architecture and Design
3-1 Security Models
3-2 Security Controls
3-3 Secure Network Design
3-4 Secure Systems Design
3-5 Secure Application Design
3-6 Secure Cloud Architecture
3-7 Secure Mobile Architecture
3-8 Secure IoT Architecture
3-9 Secure Data Storage
3-10 Secure Backup and Recovery
3-11 Security in DevOps
3-12 Security in Agile Development
3-13 Security in Continuous IntegrationContinuous Deployment (CICD)
3-14 Security in Configuration Management
3-15 Security in Identity and Access Management (IAM)
4 Identity and Access Management
4-1 Authentication Methods
4-2 Authorization Mechanisms
4-3 Identity and Access Management (IAM) Concepts
4-4 Single Sign-On (SSO)
4-5 Multi-Factor Authentication (MFA)
4-6 Federation
4-7 Role-Based Access Control (RBAC)
4-8 Attribute-Based Access Control (ABAC)
4-9 Identity as a Service (IDaaS)
4-10 Identity Lifecycle Management
4-11 Access Reviews and Audits
4-12 Privileged Access Management (PAM)
4-13 Identity Federation
4-14 Identity Provisioning and Deprovisioning
5 Risk Management
5-1 Risk Management Concepts
5-2 Risk Assessment
5-3 Risk Mitigation Strategies
5-4 Business Impact Analysis (BIA)
5-5 Risk Register
5-6 Risk Treatment
5-7 Risk Monitoring and Reporting
5-8 Risk Appetite and Tolerance
5-9 Risk Communication
5-10 Risk Transfer
5-11 Risk Acceptance
5-12 Risk Avoidance
5-13 Risk Reduction
5-14 Risk in Cloud Environments
5-15 Risk in Mobile Environments
5-16 Risk in IoT Environments
6 Cryptography and PKI
6-1 Cryptographic Concepts
6-2 Symmetric Encryption
6-3 Asymmetric Encryption
6-4 Hashing
6-5 Digital Signatures
6-6 Public Key Infrastructure (PKI)
6-7 Certificate Management
6-8 Certificate Authorities (CAs)
6-9 Certificate Revocation
6-10 Key Management
6-11 Cryptographic Protocols
6-12 Cryptographic Attacks
6-13 Quantum Cryptography
6-14 Post-Quantum Cryptography
6-15 Cryptographic Use Cases
7 Security Operations
7-1 Security Operations Concepts
7-2 Security Policies and Procedures
7-3 Security Awareness and Training
7-4 Security Monitoring and Logging
7-5 Incident Response
7-6 Forensics
7-7 Disaster Recovery
7-8 Business Continuity
7-9 Physical Security
7-10 Personnel Security
7-11 Supply Chain Security
7-12 Third-Party Risk Management
7-13 Security Audits and Assessments
7-14 Compliance and Regulatory Requirements
7-15 Security Metrics and Reporting
7-16 Security Operations Center (SOC)
7-17 Security Orchestration, Automation, and Response (SOAR)
7-18 Security in DevOps
7-19 Security in Agile Development
7-20 Security in Continuous IntegrationContinuous Deployment (CICD)
4. Identity and Access Management Explained

4. Identity and Access Management Explained

Key Concepts

Identity and Access Management (IAM) involves controlling and managing user identities and their access to resources. Key concepts include Authentication, Authorization, Account Management, and Identity Federation.

Authentication

Authentication is the process of verifying the identity of a user or system. It ensures that the person or entity claiming access is who they say they are. Common methods of authentication include passwords, multi-factor authentication (MFA), and biometrics.

Example: When logging into a bank account, the user must enter a password and a one-time code sent to their mobile device. This combination of password and one-time code provides strong authentication, ensuring that only the legitimate user can access the account.

Authorization

Authorization is the process of granting or denying access to resources based on the authenticated user's privileges. It ensures that users can only access the resources they are permitted to use. Authorization is often implemented using role-based access control (RBAC) or access control lists (ACLs).

Example: An employee in the marketing department is granted access to the company's social media accounts but is denied access to the finance department's budget files. This ensures that the employee can only perform tasks relevant to their role.

Account Management

Account Management involves creating, maintaining, and deactivating user accounts. It ensures that user accounts are properly managed to prevent unauthorized access and maintain security. Key practices include password policies, account lockout mechanisms, and regular account reviews.

Example: A company implements a password policy that requires employees to change their passwords every 90 days and prohibits the reuse of old passwords. Additionally, the company reviews inactive accounts quarterly and deactivates them to prevent unauthorized access.

Identity Federation

Identity Federation allows users to use a single set of credentials to access multiple systems or services. It simplifies the authentication process for users and reduces the administrative burden on organizations. Common protocols for identity federation include SAML (Security Assertion Markup Language) and OAuth.

Example: A university uses SAML to allow students to access various online services, such as the library database and online course materials, using their university login credentials. This eliminates the need for students to create separate accounts for each service.

Conclusion

Identity and Access Management is essential for ensuring that only authorized users can access resources and that their identities are properly verified. By implementing robust authentication, authorization, account management, and identity federation practices, organizations can enhance security and streamline access for users.