This is the content of identity and access management of CISSP®

This domain 5 is worth 13 % of the grade to be achieved

Domaine 5 of CISSP®

Content updated according to the new official programme for 2024

Description
5.1Control physical and logical access to assets
5.1.1Information
5.1.2Systems
5.1.3Devices
5.1.4Facilities
5.1.5Applications
5.2Manage identification and authentication of people, devices, and services
5.2.1Identity Management (IdM) Implementation
5.2.2Single/Multi-Factor Authentication (MFA)
5.2.3Accountability
5.2.4Session management
5.2.5Registration, proofing, and establishment of identity
5.2.6Federated Identity Management (FIM)
5.2.7Credential management systems
5.2.8Single Sign On (SSO)
5.2.9Just-In-Time (JIT)
5.3Federated identity with a third-party service
5.3.1On-premise
5.3.2Cloud
5.3.3Hybrid
5.4Implement and manage authorization mechanisms
5.4.1Role Based Access Control (RBAC)
5.4.2Rule based access control
5.4.3Mandatory Access Control (MAC)
5.4.4Discretionary Access Control (DAC)
5.4.5Attribute Based Access Control (ABAC)
5.4.6Risk based access control
5.5Manage the identity and access provisioning lifecycle
5.5.1Account Access review (eg, user, system, service)
5.5.2Provisioning and deprovisioning (eg, on /off boarding and transfers)
5.5.3Role definition (eg, people assigned to new Roles)
5.5.4Privilege escalation (eg, managed service accounts, use of sudo, minimizing its use)
5.6Implement authentication systems
5.6.1OpenID Connect (OIDC)/Open Authorization (Oauth)
5.6.2Security Assertion Markup Language (SAML)
5.6.3Kerberos
5.6.4Remote Authentication Dial-In User Service (RADIUS)/Terminal Access Controller Access Control System Plus (TACACS+)

Ready to Start?