
CISSP Series - Episode 5 - Identity and Access Management – Controlling the Keys to the Kingdom
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
このコンテンツについて
🎙️ Episode: Identity and Access Management – Controlling the Keys to the Kingdom
In this episode, we explore Identity and Access Management (IAM), the backbone of cybersecurity programs that ensures only the right people, devices, and services gain access to the right resources — and nothing more. IAM is at the heart of preventing unauthorized access, data breaches, and privilege abuse.
We’ll break down key concepts such as identification, authentication, and authorization, and dive into advanced topics like multifactor authentication (MFA), passwordless authentication, and modern identity federation solutions such as SSO, SAML, OAuth, and OpenID Connect.
This episode also covers access control models, including discretionary, mandatory, role-based, and attribute-based approaches, and how they help organizations enforce least privilege and zero trust principles. Along the way, we’ll explore real-world scenarios, IAM lifecycle management, and the technologies that make it all work, from Kerberos to RADIUS.
👉 Tune in to learn how to design and manage effective IAM systems that reduce insider threats, improve compliance, and provide a strong foundation for a secure and scalable digital environment.