Advanced Cyber Security
Advanced Cyber Security
It is the security discipline that enables the right individuals (human and system users that
have been reliably identified) to access the
1. right resources at the
2. right times for the
3. right reasons
Identity and Access Management (IdAM) is the combination of –
1. Technical systems
2. Policies
3. Processes that –
1. Create
2. Define
3. Govern the – Utilization, Safeguarding of identity information,
as well as manage the relationship between an entity, and the resources to which access is
needed. It can be divided into three fundamental capabilities –
1. Manage Digital Identities
2. Authenticate Users
3. Authorize Access to Resources
TPP – CDG – MAA
Access Control Systems
1. RBAC – Role-Based Access Control
2. ABAC – Attribute-Based Access Control
3. PBAC – Policy-Based Access Control
IF A BAD ACTOR CAN FOOL THE SYSTEM INTO THINKING THAT SHE IS A LEGITIMATE USER
THROUGH THE USE OF STOLEN OR OTHERWISE COMPROMISED CREDENTIALS, THE TRUST
BASIS THAT ENABLES THE IDAM SECURITY REGIME IS FATALLY DAMAGED.