Controlling Who Gets In
Domain 5 represents 13% of the CISSP exam. Identity and access management controls who can access what resources under which conditions. Every security incident eventually traces back to access—either someone had access they shouldn’t have, or access controls failed to prevent unauthorized actions.
The IAM process follows a sequence: identification claims an identity, authentication proves it, authorization determines allowed actions, and accountability tracks what happened.
Authentication Methods
Authentication factors fall into categories: something you know (passwords, PINs), something you have (tokens, smart cards), something you are (biometrics). Multi-factor authentication requires factors from different categories—a password plus a fingerprint, not two passwords.
Biometrics measure physical or behavioral characteristics. False Accept Rate (FAR) measures how often imposters gain access. False Reject Rate (FRR) measures how often legitimate users are denied. The Crossover Error Rate (CER) where these equal indicates overall accuracy.
- Passwords remain common despite weaknesses. Strong passwords resist guessing and cracking. Password managers enable unique passwords per service. Passwordless authentication eliminates passwords entirely using biometrics or hardware tokens.
- Tokens generate one-time passwords or cryptographic challenges. Hardware tokens like YubiKeys resist phishing because they verify the site before responding. Software tokens on phones are more convenient but less secure if the phone is compromised.
- Biometrics can’t be forgotten or shared but also can’t be changed if compromised. Fingerprints work for consumer applications. Retina scans provide higher accuracy for high-security environments. Behavioral biometrics analyze typing patterns or gait.
- Certificates enable mutual authentication where both parties verify identity. Client certificates authenticate users to servers. mTLS ensures both endpoints are legitimate before exchanging data.
Access Control Models
DAC (Discretionary Access Control) lets resource owners control access. Simple but doesn’t scale—each owner makes independent decisions. MAC (Mandatory Access Control) enforces system-wide policies based on classifications. Users can’t override. Used in military and high-security environments.
RBAC (Role-Based Access Control) assigns permissions to roles, then users to roles. A “Finance Analyst” role includes all permissions that role needs. When someone joins or leaves, change their roles rather than individual permissions. Most enterprise systems use RBAC.
Identity Lifecycle
Provisioning creates accounts when users join. Maintenance handles changes—role changes, transfers, leaves of absence. Deprovisioning removes access when users leave. Each stage needs defined processes and timely execution. Orphaned accounts from incomplete deprovisioning create security gaps.
Access reviews verify that granted access remains appropriate. Quarterly reviews catch accumulated privileges from job changes. Certification requires managers to confirm their team’s access is correct and necessary.
Privileged Access Management
Administrative accounts require additional controls. PAM solutions vault credentials, record sessions, and enforce approval workflows. Just-in-time access grants privileges for specific tasks rather than standing access. Separation of duties prevents administrators from both making and approving changes.
Connecting to Other Domains
Domain 3 security models define access control requirements that Domain 5 implements. Domain 7 monitors for access control violations and responds to incidents. Domain 2 classification determines what access controls assets require.
The practice questions test understanding of when to apply DAC versus MAC versus RBAC, and how authentication factors combine for appropriate assurance levels.
Identity and access management controls who can do what to which resources. Get IAM right, and you’ve addressed one of the most common attack vectors. Get it wrong, and technical controls elsewhere won’t matter.
Leave a Reply