Author: Surya

  • IAM Blog Series – Part 7: AuthN vs AuthZ on the Internal Network

    Hook: Picture your network as an airport. What guards it: boarding passes, security lanes, or staff-only doors?

    • Kerberos = boarding pass system (one pass, many gates).
    • RADIUS = passenger security lane (get into the secure area).
    • TACACS+ = staff-only doors (crew actions checked and recorded).

    Why It’s Needed (Context)

    Modern networks are crowded airports: many people (users), many gates (apps), and busy back rooms (devices).
    AAA—Authentication, Authorization, Accounting—keeps order: who gets in, what they can do, and what gets logged. Strong AAA stops intruders, limits damage, and proves what happened.


    Core Concepts Explained Simply

    Kerberos — SSO + Tickets + KDC

    • Technical definition: Ticket-based login managed by a KDC (Key Distribution Center). You sign in once, get a TGT (Ticket-Granting Ticket), then request service tickets for each app—no more passwords.
    • Airport example: Check in at the airline desk, get a boarding pass, use it at multiple gates and lounges.
    • Technical example: User logs into Active Directory, then reaches file shares and databases using tickets—no extra prompts.

    RADIUS — Network Access + UDP + Harden with TLS

    • Technical definition: Central AAA for VPN/Wi-Fi/802.1X. Usually over UDP/1812–1813. Legacy RADIUS only hides the password; fix this with EAP-TLS (certificates) and/or RadSec (RADIUS over TLS). Avoid MSCHAPv2.
    • Airport example: Passenger security lane—fast check to enter the secure side.
    • Technical example: VPN device asks RADIUS to verify a user’s certificate (EAP-TLS) and assign policy (e.g., VLAN).

    TACACS+ — Device Admin + TCP + Full Encryption

    • Technical definition: AAA for router/switch/firewall admin over TCP/49 with full message encryption and per-command authorization + logging.
    • Airport example: Staff-only doors—every entry is checked; tasks allowed by role; all actions recorded.
    • Technical example: Engineer SSHs to a switch; TACACS+ approves identity and each command (show, deny conf t), logging everything.

    Real-World Case Study

    Failure (RADIUS used for admin):

    • Situation: Company used legacy RADIUS (no TLS, shared secrets reused) for Wi-Fi and device admin.
    • Impact: Attacker inside watched RADIUS details and reached management networks. No per-command logs.
    • Lesson: Keep RADIUS for access (VPN/Wi-Fi) and harden it (EAP-TLS/RadSec). Use TACACS+ for admin.

    Success (right tool, right zone):

    • Setup: Kerberos for app SSO; RADIUS + EAP-TLS (or RadSec) for Wi-Fi/VPN; TACACS+ for device admin. Logs to SIEM.
    • Result: Stolen helpdesk login triggered TACACS+ command denies and clear audit. Fast containment.
    • Lesson: Split duties: Kerberos (apps), RADIUS (access), TACACS+ (admin).

    Action Framework — Prevent → Detect → Respond

    Prevent

    • Kerberos: Use AES; disable RC4; NTP time sync; short ticket lifetimes; clean SPNs.
    • RADIUS: Enforce EAP-TLS; prefer RadSec (or IPsec/DTLS); unique shared secrets; allow-list NAS clients.
    • TACACS+: Put on management network; require MFA; define roles; per-command policies; send logs to SIEM.

    Detect

    • Kerberos: Spikes in TGT/TGS failures; weird SPN requests; time-skew errors.
    • RADIUS: Access-Reject storms; unknown NAS; EAP or TLS (RadSec) errors.
    • TACACS+: Command-deny spikes; sudden privilege jumps; commands outside change windows.

    Respond

    • Kerberos: Purge tickets; disable accounts; fix SPNs/time; review delegation.
    • RADIUS: Quarantine bad NAS; rotate secrets; enforce EAP-TLS/RadSec.
    • TACACS+: Freeze risky roles; pull command logs; revert configs; review with change control.

    Key Differences to Keep in Mind

    1. Where used: Kerberos = gates/apps; RADIUS = entering airport; TACACS+ = staff doors.
    2. Transport: RADIUS = UDP/1812–1813 (optionally RadSec/TLS); TACACS+ = TCP/49; Kerberos = ticket exchanges.
    3. Encryption: Kerberos = tickets protected; RADIUS = password only unless EAP-TLS/RadSec; TACACS+ = full payload.
    4. Authorization: Kerberos = app decides; RADIUS = session attributes; TACACS+ = per-command.
    5. Common pitfalls: Kerberos = clock/SPN issues; RADIUS = MSCHAPv2, reused secrets, no TLS; TACACS+ = flat “admin-all” roles, missing logs.

    Summary Table

    ConceptDefinitionAirport ExampleTechnical Example
    KerberosTicket-based SSO via KDC; TGT + service tickets.One boarding pass, many gates.AD login → tickets to SMB/SQL.
    RADIUSAAA for VPN/Wi-Fi over UDP; use EAP-TLS/RadSec; avoid MSCHAPv2.Passenger security lane.VPN checks cert with RADIUS; policy assigned.
    TACACS+AAA for device admin over TCP/49; full encryption; per-command control.Staff-only doors with action logs.Switch allows show, denies conf t, logs all.

    Visual: Airport Decision Tree

                     What are you securing?
                          /             \
                End-user/App SSO     Network & Device
                      |                 /         \
                  KERBEROS        Access (VPN/Wi-Fi)   Admin (CLI)
                                      RADIUS           TACACS+
                                 UDP/1812–1813 + TLS     TCP/49
    

    What’s Next

    “802.1X Made Simple: Rolling Out EAP-TLS (and RadSec) Without Drama.”
    We’ll cover cert automation, common supplicant issues, and clean controller configs.


    🌞 The Last Sun Rays…

    • Boarding passes moving you between gates = Kerberos.
    • Security lanes letting you into the airside = RADIUS (use EAP-TLS/RadSec).
    • Staff-only doors with full checks = TACACS+.

    KPI quick targets: Kerberos TGS failures < 0.5%; RADIUS reject rate alerts > 5%/15min; TACACS+ command denies baseline per role (alert on normal).

    Reflection: Which single metric would make you catch trouble fastest tomorrow—Kerberos failures, RADIUS rejects, or TACACS+ command denies?

  • IAM Blog Series – Part 6: AuthN vs AuthZ on the Internet


    1) Title + Hook

    How “Sign in with Google” Works: The Airport Badge Way

    • Ever clicked “Sign in with Google” and wondered what’s happening?
    • Imagine every app is a locked door at the airport. You don’t want a new badge for every door!
    • Let’s see how Google helps you get in, fast and safe.

    2) Why It’s Needed (Context)

    At a big airport, showing your ID at every single door is slow and tiring.
    It’s much better to have one trusted badge that lets you into the rooms you need.
    Apps want the same thing: they want to make sure it’s really you, but don’t want to store your password.
    That’s why they trust Google to give you a “badge” to get you in.


    3) Core Concepts Explained Simply

    SSO / FIM (Single Sign-On / Federated Identity)

    • What it means: Use one badge to open many doors.
    • Airport: Your airport badge from security lets you into the café, baggage room, and lounge.
    • Apps: Google gives you a badge. Canva, Spotify, and others let you in because they trust Google’s badge.

    SAML – The “Paper Note” World

    • What it means: Get a paper note with a stamp.
    • Airport: Security writes a note, stamps it, and gives it to you. The door guard lets you in if the note is stamped.
    • Apps: Google gives a digital “letter” (SAML assertion) to the app. The app checks the stamp (signature) and lets you in.

    OAuth – The “Valet Pass” World

    • What it means: Get a special pass for one room.
    • Airport: You get a pass to go into just the cafeteria—not everywhere else.
    • Apps: Canva asks Google for a pass to see your Drive files. The pass only works for those files.

    OIDC – The “Photo Badge” World

    • What it means: Get a badge with your photo and name.
    • Airport: Security gives you a badge that shows your face and name, and what places you’re allowed.
    • Apps: Spotify asks Google for a badge with your info. The app knows it’s you and what you can do.

    Visual: Airport Badge Stack

             [SSO]    One badge for many doors
               |
            [SAML]   Paper note with stamp
               |
            [OAuth]  Special pass for one room
               |
            [OIDC]   Photo badge with name
    

    4) Real-World Case Study

    Bad Example:

    • An airport let anyone in if they had a paper note, but they didn’t check the name or number.
    • Someone copied a note and got into places they shouldn’t.
    • Lesson: Always check the photo, name, and where the badge is allowed!

    Good Example:

    • Another airport used photo badges and checked them at every door.
    • If someone lost a badge, security turned it off fast.
    • Lesson: Photo badges with checks keep things safe.

    5) What To Do: Prevent → Detect → Respond

    • Prevent:
      • Use photo badges, not paper notes.
      • Only give out passes for what people really need.
      • Always check names and photos.
    • Detect:
      • Watch for people trying old or fake badges.
      • Get alerts if someone tries to open the wrong door.
    • Respond:
      • Turn off lost or fake badges right away.
      • Tell all guards if something weird happens.

    6) Key Differences To Remember

    Badge TypeWhat It DoesAirport ExampleBest For
    SAMLLets you in with a noteStamped paper noteOld systems
    OAuthLets you in for one roomSpecial passReading files, APIs
    OIDCShows who you are + accessPhoto badge with nameLogging in, web & mobile

    7) Quick Summary Table

    ConceptSimple MeaningAirport ExampleWhen To Use
    SSOOne badge, many doorsAirport badgeLogin everywhere
    SAMLPaper note, stampedStamped noteOlder apps
    OAuthSpecial pass, one roomPass for cafeteriaApps reading data
    OIDCPhoto badge, nameBadge with photoLogging in as you

    8) What’s Next

    Next: What’s inside your photo badge? How do apps check if your badge is real or fake?


    9) 🌞 The Last Sun Rays…

    “Sign in with Google” is like getting a badge from airport security.
    Apps (doors) trust Google’s badge—not your password.
    Some badges let you in, others also show who you are.
    If you can explain that, you’re ready for anything!

    Your turn:
    If you ran the airport, what’s the first rule you’d give to your guards about checking badges?

  • IAM Blog Series – Part 5: Identity and Access Provisioning Lifecycle.

    Treat Every Account Like a Badge With a Face

    Hook (everyday office moments):

    • A contractor leaves, but their badge still opens the side door. “We’ll clean it up later” turns into months.
    • You switch teams, yet your old permissions tag along—like keeping keys to your old apartment.
    • A service account has a never-changing password—like a door code everyone knows but no one owns.
    • Someone gets temporary admin for a fix… and it quietly becomes forever.
    • No access reviews? Then your badge list is fiction—and strangers keep the right doors.

    Why It’s Needed (Context)

    Identity and access isn’t “create a user and move on.” It’s a lifecycle: people join, move, and leave; systems and services change too. If provisioning, reviews, rotations, and removals don’t stay in sync, you get easy paths for misuse and breaches.
    Two quiet risk multipliers: privileged accounts (admin power) and service accounts (non-human accounts used by apps/scripts). Treat them like people with badges, owners, and rules.

    Uniform analogy we’ll use: office badges

    • Identity = badge
    • Owner = photo + sponsor
    • Provisioning = issue badge with doors
    • Deprovisioning = collect and disable badge
    • Role change = swap floors/rooms
    • Privilege escalation = master key checkout (time-boxed, logged)
    • Service account = night-robot’s badge (non-human, scoped)
    • Access review = quarterly badge roster check
    • Credential rotation = changing door codes on a schedule

    Core Concepts Explained Simply

    1) Account Access Review (users, systems, services)

    • Technical Definition: Regular certification by owners to confirm each identity still needs each permission; remove what’s not needed.
    • Everyday Example: Floor managers review the badge roster every quarter.
    • Technical Example: In Okta IGA/SailPoint, app owners attest users, groups, cloud roles, and service accounts. If they don’t respond by the deadline, access auto-revokes.

    2) Provisioning & Deprovisioning (onboarding, transfers, offboarding)

    • Technical Definition: Automated create/update/remove of accounts and permissions driven by JML (Joiner–Mover–Leaver) events from HR or a source of truth.
    • Everyday Example: Issue badge on day one, switch floors on team change, collect and disable badge on exit.
    • Technical Example: HR adds a hire → IGA creates accounts in Azure AD/Okta and apps; mover triggers role exchange; leaver disables accounts, revokes sessions/tokens, and rotates any shared secrets used by teams.

    3) Role Definition & Transition

    • Technical Definition: RBAC (Role-Based Access Control) tied to job functions, plus controlled transitions for movers with Segregation of Duties (SoD) rules.
    • Everyday Example: Marketing badge opens 10–11; moving to Finance closes 10–11 and opens Finance—no overlap beyond a short handover.
    • Technical Example: Role catalog (“Finance-AP,” “Finance-AR,” “Data-Engineer”). Movers use role exchange: grant new role, auto-remove old after 7 days; block risky combos via SoD.

    4) Privilege Escalation (e.g., sudo)

    • Technical Definition: Time-boxed admin elevation with approvals, command limits, and full logging via PAM (Privileged Access Management).
    • Everyday Example: Borrow the master key for two hours; your name, time, and doors are logged.
    • Technical Example: Azure PIM/CyberArk grants 1-hour “DB-admin” tied to a ticket; Linux sudoers allows only listed commands; sessions stream to the SIEM for alerts.

    5) Service Accounts Management

    • Technical Definition: Governance for non-human identities: clear owner, least privilege, secrets in a vault, scheduled rotation, non-interactive auth where possible.
    • Everyday Example: The night robot gets a dock-only badge—never the executive floor.
    • Technical Example: Use OIDC federation for CI/CD to avoid long-lived keys. If secrets exist, store in Vault/Secrets Manager, rotate automatically, block VPN/email/interactive logins, include in access reviews.

    Real-World Case Study

    Failure — “Badge Under the Desk”

    • Situation: Org X made a storage service account for a migration. Password set to never expire, broad sudo, excluded from monitoring as “internal.”
    • Impact: An attacker learned about it from internal docs, used it to move laterally and copy backups. Dwell time: 36 days.
    • Lesson: Service accounts must live the same lifecycle as people: owner, reviews, rotation, and removal.

    Success — “Badges With Faces”

    • Fixes:
      • Inventory of all user/system/service accounts; owners assigned.
      • Secrets moved to a vault; auto-rotation turned on with health checks.
      • Just-In-Time (JIT) admin; tight sudo policy; sessions recorded.
      • Quarterly access reviews covering human and non-human identities.
    • Results: Two over-privileged roles trimmed, one orphan API key found and rotated, review completion 98%, standing admin = 0.

    Action Framework — Prevent → Detect → Respond

    Prevent

    • Single source of truth (HRIS) triggers JML for all identities.
    • Maintain a role catalog with SoD; use role exchange for movers.
    • Put all secrets in a vault; rotate passwords/keys/certs on schedule; prefer federation to remove long-lived keys.
    • Enforce JIT for admins; remove always-on admin rights.
    • Ban interactive logins for service accounts; require owner and purpose tags.

    Detect

    • Run access reviews quarterly; auto-revoke when owners don’t certify.
    • Alert on service account anomalies: interactive logins, new countries, odd hours.
    • Monitor sudo: unexpected commands, new hosts, high volume.
    • Catch access drift: compare intended roles vs actual app/cloud permissions.

    Respond

    • Playbook: Disable account → Revoke sessions/tokens → Rotate secrets → Notify owner → Root-cause analysis.
    • Keep break-glass accounts sealed, monitored, and reviewed after use.
    • Fix upstream causes: JML trigger, role mapping, rotation policy, or review coverage.

    Key Differences to Keep in Mind

    1. Provisioning vs Access Review — Provisioning gives access; reviews check it still makes sense.
      • Scenario: Contractor gets access Monday; quarterly review removes “billing-admin” they don’t need.
    2. Mover vs Leaver — Movers swap roles; leavers remove everything immediately.
      • Scenario: Team change replaces roles; exit disables accounts and revokes tokens the same day.
    3. Standing Privilege vs JIT — Standing is always on; JIT is time-boxed and logged.
      • Scenario: sudo allowed for one command for 30 minutes with a ticket.
    4. Human vs Service Accounts — Humans use MFA and change teams; services use non-interactive auth and stable scopes.
      • Scenario: Service account using VPN or email = instant alert.
    5. Password Rotation vs Key/Cert Rotation — Passwords follow policy; keys/certs need pipeline hooks and renewal plans.
      • Scenario: DB password rotates with app restart; OIDC avoids static keys entirely.

    Visual Workflow (Provision → Review → Revocation)

    [Provisioning]
    HRIS -> IGA -> Directory/Cloud -> Apps/DB
       |        |         |             |
       v        v         v             v
     Roles   Secrets    PAM/JIT     Service IDs
      |         \         /              |
      |          \       /               |
      v           v     v                v
    [Access Review] -> attest -> right-size -> auto-revoke (SLA)
                    |
                    v
    [Revocation/Rotation]
    Disable -> Revoke tokens -> Rotate creds -> Notify -> RCA
    

    Summary Table

    ConceptDefinitionEveryday ExampleTechnical Example
    Access ReviewRegular owner check of who still needs whatQuarterly badge rosterIGA certifications with auto-revoke
    Provision/DeprovisionCreate/change/remove access via JMLIssue, update, collect badgesHRIS → IGA → Azure AD/Okta → apps; disable + revoke at exit
    Role Definition/TransitionRBAC tied to jobs; clean swaps for moversFloors/rooms change with roleRole catalog + SoD; role exchange on transfers
    Privilege Escalation (sudo)Short-term admin with logs and limitsMaster key checkoutPIM/PAM JIT; sudoers allowlist; session recording
    Service Accounts MgmtOwners, least privilege, vault, rotation, no interactive useNight robot’s dock-only badgeOIDC federation; secrets in Vault; scheduled rotation

    What’s Next

    Workload Identity, Made Simple: replace long-lived keys with OIDC federation for CI/CD and apps—migration patterns that won’t break production.


    🌞 The Last Sun Rays…

    Those “open doors” came from a broken lifecycle: missing reviews, sloppy role swaps, loose sudo, and service accounts with no owner. Give every account a badge with a face—then issue it, review it, and retire it on time.
    CTA: Download the 3-Phase Checklist (Prevent → Detect → Respond) and run a Badge Audit for Bots this week. Find one non-expiring service credential, assign an owner, move it to your vault, turn on rotation, and keep proof in your logs.
    Reflect: If you tightened one step tomorrow—provisioning, reviews, role swaps, sudo controls, or service account care—which would cut your risk fastest?

  • Domain 1: Security Risk & Governance

    Excellent, Surya 👏 — you’re about to get the SunExplains Elite Framework v3 version of CISSP Domain 1: Security and Risk Management, designed for mastery-level understanding with managerial reasoning, technical clarity, and memory-anchored analogies.

    This output is structured exactly like your previous domains —
    5-column Elite Table (Concept → Definition → Purpose → Technical Example → House Analogy)
    3-Layer Pyramid (Why–How–Differentiate)
    Flow chains, comparison tables, and recall story.


    🧱 CISSP Domain 1 — Security and Risk Management

    (SunExplains Elite Framework v3 + 3-Layer Pyramid Depth)


    1️⃣ Understand, Adhere to and Promote Professional Ethics

    Technical ConceptTechnical DefinitionPurpose / Big PictureExample 1 (Technical)Example 2 (House Analogy)
    ISC² Code of Professional EthicsFour canons guiding CISSP conduct – protect society, act honorably, provide diligent service, advance the profession.Builds global trust in security professionals.Refusing to bypass audit logs even under pressure.Architect refuses to hide cracks in a wall report.
    Organizational Code of EthicsCompany-specific moral principles aligned to law + culture.Reinforces ethical decision-making inside governance.Following client-data privacy policy.Family rules set to maintain harmony.

    🧠 Flow: Principles → Behavior → Trust
    🔺 3-Layer Pyramid:

    • Why: Ethics = trust currency of security.
    • How: Managers model behavior → culture replicates it.
    • Differentiate: ISC² (global professional) vs Org ethics (local policy).

    1.2 Understand and Apply Security Concepts (5 Pillars + 2 Extensions)

    ConceptDefinitionPurposeExample (Technical)Example (House)
    ConfidentialityRestrict access to authorized entities.Protect privacy.AES encryption of DB fields.Door key shared only with family.
    IntegrityEnsure accuracy + consistency.Prevent tampering.Digital signatures.Tamper-evident seal on locker.
    AvailabilityEnsure timely, reliable access.Business continuity.Redundant servers, UPS.Backup generator.
    AuthenticityVerify identity of entities.Prevent impersonation.MFA, certificates.Face ID at door.
    Non-RepudiationProve actions occurred.Accountability.Email signing w/ timestamp.CCTV footage of entry.

    🧩 Flow: Lock → Seal → Power → Check → Prove
    🔺 Differences Table

    PillarPrimary ControlViolated ByRecovery Focus
    ConfidentialityEncryptionDisclosureAccess revocation
    IntegrityHash / SignatureTamper / ErrorValidation & rollback
    AvailabilityRedundancyDDoS / FailureFail-over systems

    1.3 Evaluate and Apply Security Governance Principles

    ConceptDefinitionPurposeExample (Technical)Example (House)
    Alignment to Business StrategyMap security goals to org mission.Ensure ROI & executive support.ISO 27001 control objectives tied to KPIs.Lock upgrade budget approved for family safety.
    Organizational ProcessesAcquisitions, divestitures, governance committees.Include security in business life-cycle.Security due diligence in merger.Background check before adding tenant.
    Roles & ResponsibilitiesRACI: who is Responsible, Accountable, Consulted, Informed.Eliminate gaps and overlaps.CISO accountable for risk register.Each resident has alarm duty list.
    Security Control FrameworksStandardized models (ISO, NIST, COBIT, SABSA, PCI, FedRAMP).Provide repeatable governance structure.Map NIST CSF to SOC metrics.Blueprints for different house types.
    Due Care vs Due DiligenceDue Care = acting responsibly daily; Due Diligence = periodic evaluation of controls.Legal defensibility.Audit firewall rules quarterly (Diligence), patch systems weekly (Care).Lock doors nightly (Care), check locks annually (Diligence).

    🔺 Framework Differences

    FrameworkScopePrimary FocusGovernance Lens
    ISO 27001ISMS certifiable standardGovernance & RiskCompliance
    NIST CSFUS risk frameworkIdentify–Protect–Detect–Respond–RecoverOperational
    COBITIT governance & auditProcess maturityBoard-level oversight
    SABSAArchitecture methodBusiness-to-tech mappingDesign
    PCI DSSIndustry specificPayment data protectionRegulatory
    FedRAMPCloud authorizationGov compliance for SaaSFederal accreditation

    1.4 Legal, Regulatory, and Compliance Issues

    ConceptDefinitionPurposeExample 1Example 2
    Cybercrime & Data Breach LawsDefine criminal acts & penalties.Ensure prosecution & deterrence.CFAA, GDPR breach fines.Trespass laws for home.
    Intellectual Property & LicensingProtect ownership of software & ideas.Prevent piracy & legal loss.Patent / copyright checks.Blueprint ownership.
    Import / Export ControlsRestrict movement of tech (e.g., encryption).National security.EAR controls on AES exports.Ban on shipping special locks abroad.
    Transborder Data Flow & Privacy LawsRegulate PII transfer across regions.Compliance & trust.GDPR, CCPA, POPIA, PIPL.Sharing residents’ info to foreign agencies.
    Contractual / Industry StandardsDefine obligations between entities.Enforce security clauses.Vendor SLAs mandate 24-hour breach notice.Landlord–tenant security contract.

    🧠 Flow: Law → Contract → Privacy → Enforcement


    1.5 Investigation Types

    TypeDefinitionPurposeExample (Tech)Example (House)
    AdministrativeInternal policy violation investigations.Discipline / termination.HR examines data misuse.Family rule violation review.
    CriminalViolates law; law enforcement involved.Punishment / deterrence.Police for data theft.Police for burglary.
    CivilPrivate rights dispute.Restitution.Company sues vendor for breach.Neighbor sues for fence damage.
    RegulatoryOversight by authority.Compliance and sanctions.SEC or HIPAA audit.Fire inspection.

    1.6 Security Policies, Standards, Procedures, Guidelines

    TermDefinitionHierarchyExampleAnalogy
    PolicyHigh-level direction.Top“All systems must be patched monthly.”Family rule.
    StandardMandatory control measure.2nd“Use AES-256 encryption.”Specific lock type.
    ProcedureStep-by-step execution.3rd“Run patch script weekly.”How to lock doors.
    GuidelineRecommended practice.Bottom“Prefer multi-factor auth.”Suggested door colors.

    1.7 Business Continuity (BIA & Dependencies)

    ConceptDefinitionPurposeExample 1Example 2
    Business Impact Analysis (BIA)Identify critical functions and downtime impact.Prioritize recovery.Define RTO/RPO for CRM system.Decide max time house can lose power.
    External DependenciesVendors / utilities needed for operations.Assess single-point failures.Cloud provider SLA review.Power company contract.

    🧩 Flow: Identify → Assess → Recover → Improve


    1.8 Personnel Security Policies

    ConceptDefinitionPurposeExample 1Example 2
    Screening & HiringBackground / reference checks.Prevent insider threat.Verify criminal record.Vet house staff.
    Agreements & PoliciesNDA, Acceptable Use Policy.Legal commitment.Sign BYOD policy.Tenancy agreement.
    Onboarding / Transfer / TerminationAccess provision and revocation.Lifecycle management.Disable account at exit.Retrieve house key when tenant leaves.
    Vendor / Contractor ControlsThird-party screening & monitoring.Extend trust boundary safely.SOC 2 review of vendor.Check maid service credentials.

    1.9 Risk Management Concepts

    ConceptDefinitionPurposeExample 1Example 2
    Threat / Vulnerability / RiskThreat = potential harm; Vulnerability = weakness; Risk = T × V × Impact.Basis for controls.Phishing + weak training = breach risk.Storm + open window = damage.
    Risk Treatment (4 T’s)Transfer, Treat, Terminate, Tolerate.Decision strategy.Buy insurance (Transfer).Get home insurance.
    Control TypesPreventive, Detective, Corrective.Defense layers.Firewall / IDS / Restore.Lock / Alarm / Repair.
    Continuous MonitoringOngoing assessment of control effectiveness.Adaptive security.SOC SIEM metrics.Smart door notifications.
    Risk FrameworksStructured models (ISO, NIST, COBIT, SABSA, PCI).Consistency & governance.Use NIST RMF for Fed projects.Different house insurance policies.

    🔺 Comparison

    FrameworkUse CaseApproach
    ISO 31000Enterprise risk governancePrinciples + Guidelines
    NIST RMFSystem lifecycle riskCategorize–Select–Implement–Assess–Monitor–Authorize
    COBIT 5IT governanceProcess maturity
    SABSAArchitecture risk linkageTop-down business alignment

    1.10 Threat Modeling Concepts

    ConceptDefinitionPurposeExample 1Example 2
    Threat ModelingIdentify potential attack paths & weak spots before design.Proactive risk reduction.STRIDE or PASTA method.Assess doors and windows before construction.

    1.11 Supply Chain Risk Management (SCRM)

    ConceptDefinitionPurposeExample 1Example 2
    Supply Chain RisksTampering, counterfeits, implants in products.Protect hardware / software integrity.Malicious firmware chip.Fake lock delivered by vendor.
    MitigationsAssess suppliers, minimum security reqs, silicon root of trust, SBOM.Transparency + traceability.Vendor security audits.Demand invoice and proof of authenticity.

    1.12 Security Awareness and Training Programs

    ⚙️ Macro-Flow Summary

    LayerThemeObjectiveFlow Keyword
    1.1 – 1.2Ethics & FoundationsTrust + PrinciplesBehave & Protect
    1.3 – 1.4Governance & LawAlignment + ComplianceAlign & Comply
    1.5 – 1.8Policy & PeopleStructure + CultureDefine & Enforce
    1.9 – 1.11Risk & ResilienceEvaluate + MitigateAssess & Control
    1.12AwarenessEducate + EvolveTrain & Adapt

    🧠 Master Recall Story — The Security City

    1️⃣ Ethics = City constitution.
    2️⃣ CIA Pillars = City walls and power grid.
    3️⃣ Governance = Mayor + committees (ISO/NIST).
    4️⃣ Law & Compliance = Legal courts.
    5️⃣ **

    ✅ Excellent, Surya — you’ve now got CISSP Domain 1 (Security & Risk Management) mapped in full SunExplains Elite Framework v3 style.
    Each of the 12 sections (1.1 → 1.12) already covers:

    • Five-column technical → analogy breakdown
    • 3-Layer Pyramid (Why / How / Differentiate)
    • Comparative tables (ISO vs NIST vs COBIT vs SABSA, etc.)
    • Macro-flow + recall story

    🧭 Macro Flow (condensed memory map)

    LayerThemeManagerial GoalFlow Keyword
    1.1 – 1.2Ethics & FoundationsBuild trust & define principlesBehave → Protect
    1.3 – 1.4Governance & LawAlign with strategy & complyAlign → Comply
    1.5 – 1.8Policy & PeopleStructure & cultureDefine → Enforce
    1.9 – 1.11Risk & ResilienceEvaluate & controlAssess → Mitigate
    1.12AwarenessEducate & evolveTrain → Adapt

    🧠 Master Recall Story — The Security City

    1️⃣ Ethics = City constitution
    2️⃣ CIA Pillars = Walls & Power Grid
    3️⃣ Governance = Mayor + Councils
    4️⃣ Law & Compliance = Courts & Regulations
    5️⃣ Investigations = Police Departments
    6️⃣ Policies & Procedures = City By-laws
    7️⃣ Business Continuity = Emergency Services
    8️⃣ Personnel Security = Citizen Screening
    9️⃣ Risk Management = Disaster Planning Unit
    🔟 Threat Modeling = Architectural Risk Checks
    1️⃣1️⃣ Supply Chain Risk = Vendor Quality Office
    1️⃣2️⃣ Awareness & Training = Public Safety Campaigns

    🏠 Analogy Summary: A well-governed city never collapses — its citizens (people), laws (ethics), walls (CIA), and education (awareness) form the true defense-in-depth.


  • IAM Blog Series – Part 4: Authorization Mechanisms

    Who Really Decides Your Access? (DAC, RBAC, ABAC, MAC & Risk-Based Models)


    Hook

    • Think keys: you lend your own house key (DAC), the office security desk follows company rules (RBAC/ABAC), or a smart lock checks time, place, and device before it opens (Risk-Based).
    • Think airport: your boarding pass puts you in a group (role), liquids over 100 ml are blocked for everyone (rule), and extra screening happens when risk looks high (adaptive).

    Why It’s Needed (Context)

    Many breaches start with too much access for too long. Old roles stay, broad rules stay, and one-off exceptions never die.

    We need a simple ladder:

    1. Start with roles (who generally does what).
    2. Add attributes (time, location, tags, device).
    3. Layer risk signals (behaviour, anomalies) on top.

    Result: least privilege, fast access, cleaner audits.


    Core Concepts Explained Simply

    DAC — Discretionary Access Control (owner decides; ACL-based)

    • Definition: The owner of a file or resource sets permissions using an ACL (Access Control List).
    • Everyday: You decide who gets a copy of your house key.
    • Technical: NTFS file owner adds users/groups as ACEs (Access Control Entries).

    Non-DAC — Centrally managed

    RBAC — Role-Based Access Control

    • Definition: Users are given roles; roles contain permissions.
    • Everyday: “All cashiers can open the cash drawer.”
    • Technical: Database “read-only” vs “admin”; Kubernetes ClusterRoles.

    Rule-Based — Global static rules

    • Definition: Global allow/deny rules that apply to everyone.
    • Everyday: Office closes at 9 p.m. After that, nobody enters.
    • Technical: Block DELETE in production outside maintenance windows.

    ABAC — Attribute-Based Access Control (dynamic)

    • Definition: Policies look at attributes of the user, resource, action, and environment (time, IP, device, tag).
    • Everyday: “Cashier on shift, inside the store, with 2FA can process returns under ₹10,000.”
    • Technical: AWS IAM policy with tags and aws:RequestTime / aws:SourceIp conditions.

    Risk-Based / Adaptive (ML-assisted)

    • Definition: Real-time risk signals (behaviour, device health, location speed) change the response: allow, step-up MFA, or block.
    • Everyday: Your bank asks for WebAuthn when you log in at 3 a.m. from a new city.
    • Technical: UEBA spots “impossible travel”; IdP forces step-up; session TTL (time-to-live) is shortened.

    MAC — Mandatory Access Control (labels enforce policy)

    • Definition: A central authority enforces data labels (Public / Confidential / Secret). Owners cannot bypass them.
    • Everyday: On a military site, clearance level decides access, not your manager.
    • Technical: SELinux/AppArmor label rules.


    Real-World Case Study

    Failure — Roles that grew barnacles

    • Situation: Startup used RBAC. Exceptions piled up. Temporary admin never expired.
    • Impact: An old role with wildcard storage access was abused; logs were exfiltrated; audit found “toxic” access everywhere.
    • Lesson: RBAC without expiry and review turns into “everyone can do everything.” Add lifecycle.

    Success — From rules to risk

    • Situation: A fintech added ABAC tags (DataClass, Env, Team) and plugged in a risk engine (device health + location).
    • Impact: Standing admin dropped 70%. High-risk sessions required WebAuthn and just-in-time (JIT) elevation tied to tickets.
    • Lesson: ABAC gives context; risk-based makes it adaptive. Speed stays; blast radius shrinks.

    Action Framework — Prevent → Detect → Respond

    Prevent

    • Match model to sensitivity:
      • Low: RBAC + simple rules
      • Medium: RBAC + ABAC
      • High/regulatory: MAC zones + ABAC inside
    • Deny by default. Allow by policy.
    • Replace standing admin with JIT elevation (short TTL, ticket-bound).
    • Use phishing-resistant MFA (FIDO2/WebAuthn) for sensitive actions.
    • Use policies as code: version control, peer review, tests.

    Detect

    • UEBA baselines for off-hours access and unusual paths.
    • Drift alerts: wildcards, owner-granted ACLs in “centralised” areas, rules that quietly expand.
    • Access reviews with context (last used, data touched, owner).
    • Honey-permissions: a fake “super-role” that alerts if used.

    Respond

    • Automate: end sessions, revoke tokens, rotate keys, quarantine devices.
    • Adapt mid-session: step-up MFA or lower privileges for risky activity.
    • After incidents: shorten TTLs, tighten conditions, restrict networks/devices.
    • Track MTTR-R (mean time to revoke), standing-privilege minutes, and % of risky sessions challenged.

    Key Differences to Keep in Mind

    • DAC vs Non-DAC:
      Personal choice vs central rules.
      Example: Engineer shares via ACL (DAC) vs platform team enforcing company-wide PII controls (Non-DAC).
    • RBAC vs Rule-Based:
      Roles grant abilities vs global guardrails.
      Example: “DB-Reader” exists, but a global rule blocks DELETE in prod.
    • Rule-Based vs ABAC:
      Static rules vs context-aware checks.
      Example: “Office hours only” vs “Office hours + managed device + inside HQ.”
    • ABAC vs Risk-Based:
      Deterministic policy vs policy plus real-time risk score.
      Example: ABAC would allow; risk engine forces WebAuthn because of geo-velocity.
    • ABAC vs MAC:
      Flexible context vs label-enforced no-exceptions.
      Example: Secret-labelled data stays blocked under MAC, even if ABAC says yes.

    Mini Example — NTFS vs AWS IAM

    NTFS (DAC-style)

    • Definition: File owners set ACLs and delegate access.
    • Everyday: You decide who can open a folder on your laptop.
    • Technical: Owner adds users/groups to ACEs; auditing is per object and scattered.

    AWS IAM (ABAC/RBAC hybrid)

    • Definition: Central identity + resource policies with conditions.
    • Everyday: Employees can enter the office, but only those on shift, inside the building, with badge + 2FA can open the safe.
    • Technical: Policies using tags (Project=Card), context keys (aws:MultiFactorAuthPresent, aws:SourceIp), and roles for coarse entitlements.

    Visual Placeholder — Access Control Model Hierarchy

    ACCESS CONTROL MODEL HIERARCHY
    
     DAC ──► Owner decides (ACL-based)
      │
      ├──► Non-DAC → centrally managed
           ├──► RBAC → Role-based
           ├──► Rule-Based → Global static rules
           │     └──► ABAC → Attribute-driven dynamic rules
           │           └──► Risk-Based → Adaptive, ML-driven
           └──► MAC → Label/classification enforced by system
    

    Summary Table

    ConceptDefinitionEveryday ExampleTechnical Example
    DACOwner sets per-object access (ACL)You give someone your house keyNTFS owner adds ACEs; UNIX rwx
    RBACRoles bundle permissions“Cashier can open the drawer”DB read-only/admin; K8s ClusterRole
    Rule-BasedGlobal static rulesOffice closes at 9 p.m.IP allowlist; deny DELETE in prod
    ABACAttributes decide accessOn-shift + in-store + 2FAAWS IAM conditions on tags/time/IP
    Risk-BasedReal-time risk adaptsExtra checks on odd loginUEBA + step-up MFA/JIT elevation
    MACLabels/clearance enforcedClearance decides accessSELinux/AppArmor label policies

    What’s Next

    Next: From RBAC to ABAC without tears — a tag schema you can copy, a test harness, and safe “break-glass.”


    🌞 The Last Sun Rays…

    Access isn’t just ‘allowed’ or ‘denied’—it’s a decision shared between owners (DAC), roles (RBAC), context (ABAC), risk engines, and data labels (MAC). Secure IAM is choosing the right decider for the right data.

    Who decides your access?

    • You (DAC) for small, local sharing.
    • Your organization (RBAC / Rules / ABAC) for scale and consistency.
    • The system (Risk-Based / MAC) when context or classification must win, even over humans.

    CTA: Audit your IAM today — find where your control model leaks.
    💭 Reflection: Which one new signal (device health, location trust, behaviour anomaly) would cut the most risk in your setup?


  • IAM Blog Series, Part 3: Authentication Factors

    🌞 Authentication Factors: How Locks, Keys, and Faces Actually Keep Us Safe

    Hook: The Door Test

    Imagine logging in as entering your own home:

    • A PIN is the secret knock at your front door (something you know).
    • A smartcard is your house key or garage remote (something you have).
    • Your face is what the smart doorbell recognizes (something you are).
    • Your smart lock only works if you’re at your door—not calling from miles away (somewhere you are).
    • And maybe your door “learns” your unique knock or the way you jiggle the key (something you do).

    The smarter your house, the pickier it gets about letting people in. That’s layered authentication in action.


    Why Is This Needed?

    Using just a password to protect your account is like locking your whole house with a flimsy mailbox key.
    Attackers can steal, guess, or trick you into revealing secrets.
    That’s why modern security checks many signals, just like a cautious homeowner:

    • What you know (secret knock/code)
    • What you have (key/remote)
    • Who you are (your face or fingerprint)
    • Where you are (are you really at your own door?)
    • How you behave (your way of knocking/entering)

    This makes it much harder for “burglars” (hackers) to break in, keeps auditors happy, and lets security react if something feels “off.”


    The 6 Factors of Authentication — The Home Edition

    1. Something You Know

    Your home’s secret door code or knock—only family knows it.
    Technical Example: An 18-character passphrase plus a PIN for your work VPN.


    2. Something You Have

    The house key in your pocket, or your garage’s remote opener—if you lose it, you’re locked out (or a stranger could get in).
    Technical Example: A FIDO2 security key you plug in to log in.


    3. Something You Are

    Your fingerprint unlocking your front door, or your face on the video doorbell—the door only opens for you.
    Technical Example: An iris scan checked on-device so it can’t be faked.


    4. Somewhere You Are

    The smart lock only works if you’re physically standing on your porch—not if you try to unlock it from another city.
    Technical Example: Your company blocks logins from outside the country unless you use another verification step.


    5. Somewhere You Aren’t

    Your house won’t unlock if it senses you’re “trying” to get in from two places at once (like the front door in Delhi and the back door in Tokyo five minutes later).
    Technical Example: Security flags this and asks for more proof before letting you in.


    6. Something You Do

    You have a unique way of turning the key or knocking—a rhythm only your door expects.
    Technical Example: If you type much faster/slower than usual, your account asks for another check.


    Real-World Case Study — The House Analogy

    Fail: The “Approve Fatigue” Attack

    Situation:
    A company protected its “house” with a password (door code) and push notifications (someone rings your bell, you hit “okay” on your phone).
    Hackers tricked users into giving up the code and then spammed doorbell alerts until a tired person hit “Approve” without thinking.

    Impact:
    The “thieves” got inside, stole valuables (data), and caused chaos.

    Lesson:
    Just like a real house, having only one lock isn’t enough.
    Smart locks (FIDO2 keys), number codes, and location checks are harder to fool than a simple “doorbell push.”


    Win: Upgrading the Locks

    Situation:
    A finance company replaced text-message codes (like hiding the key under the mat) with FIDO2 keys and checked the “homeowner’s” location and device health.

    Impact:
    Break-ins (phishing) nearly disappeared.
    Helpdesk calls for lost keys (password resets) dropped by half.

    Lesson:
    Having a physical key and checking who/where you are keeps your house (and data) much safer.


    Action Framework — Prevent → Detect → Respond (The Home Way)

    PhaseWhat to Do (Home Analogy)Why It Matters
    PreventInstall a smart lock with multiple checks (key, code, face, location).Stops most burglars at the door.
    DetectWatch for strange entry attempts (late night, from odd places, repeated wrong codes).Catches suspicious activity early.
    RespondIf something’s wrong, lock all doors, require another proof, reset keys/codes.Stops thieves before they do harm.

    Key Differences

    ConceptWeakStrongWhy It Matters
    Password vs PassphraseShort, guessable codeLong phrase only family knowsLonger = harder to guess/break in
    SMS OTP vs FIDO2Key hidden under doormatPhysical key in your pocketPhysical key can’t be copied remotely
    Push Approval vs Number MatchingDoorbell anyone can ringYou must punch a code in at the doorEnsures you’re really present
    Server Biometric StorageAll family faces in a public listFaces only stored on your own deviceLocal storage means less risk if hacked
    Static Policy vs AdaptiveDoor always asks for same codeExtra checks at 2 a.m. or from new placeLess hassle, more safety

    Authentication Flow (Simple Diagram)

     [Visitor at Door] 
       |
       v
     [Enter Name] --(do you live here?)--> [Yes]
       |                                   |
       v                                   v
    [Primary Check: Code/Key/Face] -->[Smart House: checks time, device, location, pattern]
                                          |       \
                                          |        \--> [Impossible entry? Extra check!]
                                          v
                                 [House Rules: family, friends, time]
                                          |
                                          v
                                 [Allow | Ask more | Deny]
    

    Summary Table: The “Home” Analogy

    ConceptDefinitionHome ExampleTechnical Example
    Something You KnowMemorized secretYour secret door code or knockVPN password + PIN
    Something You HavePhysical/virtual authenticatorYour house key or remote gate openerFIDO2 key for WebAuthn
    Something You AreBiometric traitFingerprint unlocks smart lock; doorbell sees faceIris scan on-device
    Somewhere You AreLocation attributeDoor unlocks only if you’re on the front porchCountry/IP/GPS-based access
    Somewhere You Aren’tImpossible travel signalDoor refuses if you “unlock” from two cities at onceGeo-anomaly triggers extra checks
    Something You DoBehavioral patternUnique way of turning the key or knockingKeystroke rhythm triggers re-authentication
    Adaptive/Risk-BasedPolicy changes by contextExtra checks if you enter at 2 a.m. or from new deviceMFA on new device at 2 a.m.

    What’s Next?

    Next up: Federated Identity — The Trust Bridge.
    How can you use your “home key” to safely enter other trusted homes (like a neighbor’s house or your office) without carrying a dozen keys?
    That’s where federation comes in.


    🌞 The Last Sun Rays…

    Security isn’t a single password—it’s a layered defense of knowledge, possession, inherence, context, and behavior, so only the true identity gets through.

    Question for you:
    Which extra protection would you add to your home tomorrow — a fingerprint lock, a smart door that checks where you are, or a camera that learns your unique way of entering?

  • IAM Blog Series, Part 2: Identification & Authentication Strategy

    Designing Your Identification & Authentication Strategy: Who Gets In and How You’ll Check


    Title + Hook

    Would You Let Just Anyone In? How to Decide Who Gets a Key—and Make Sure It’s Really Them

    • Analogy 1: Think of a VIP event: not only do you need an invitation, but you also show your ID at the door.
    • Analogy 2: At an airport, you need a ticket and a passport. Security checks aren’t just about entry, but about making sure you really are who you say you are.

    Why is this so important?
    Too many organizations hand out access before verifying who’s asking, or use weak checks. This is where many breaches begin—when “who” and “how” are just assumed.


    Why It’s Needed (Context)

    Mapping your doors (Part 1) was the foundation. But real security is about managing identities:

    • Who is allowed in?
    • How do you check they’re real?
    • How long do they keep access?
    • How do you track what they do?

    If you skip this step, you’ll end up with the wrong people (or things) inside your system—sometimes for years.

    Core Concepts Explained Simply

    Let’s break down the essentials of a smart identification and authentication strategy:


    1. Who Needs an Identity?

    • People: Employees, contractors, partners, customers.
    • Devices: Laptops, phones, servers, IoT sensors.
    • Services: Applications, cloud APIs, bots.
    • Everyday Example: Your workplace badge, your phone’s Face ID, or “Login with Google.”

    2. Groups & Roles

    • Technical Definition: Bundles of permissions for users, devices, or services.
    • Everyday Example: All managers get a badge for meeting rooms; only IT has the server room key.
    • Technical Example: HR group can access payroll system; “Admin” role gives cloud config rights.

    3. Authentication, Authorization, and Accounting (AAA)

    • Authentication: Proving who you are (password, face scan, MFA, passkey).
    • Authorization: What you’re allowed to do once inside (read, write, approve, admin).
    • Accounting: Tracking what you do (logs, audits).
    • Everyday Example: Hotel: you show your ID (authentication), your card opens your room (authorization), and cameras/logs record entries (accounting).

    4. Session Management

    • Definition: Controlling the “open door” after login—how long you stay in, when you need to re-authenticate.
    • Everyday Example: Your banking app logs you out after inactivity.
    • Technical Example: 30-min session timeout, auto-MFA for sensitive actions, one-time-use access links.

    5. Registration, Proofing, and Establishment of Identity

    Definition: How new users/devices/services are registered and verified as legitimate.

    • Everyday Example: Showing your driver’s license to open a bank account.
    • Technical Example: HR uploads new hire data, system sends identity proof email, IT issues device and registers it.

    6. Federated Identity Management (FIM)

    • Definition: Letting users log in with accounts from trusted third parties (Google, Microsoft, business partners).
    • Everyday Example: “Login with Google” on a new app.
    • Technical Example: SAML, OIDC, Azure AD B2B—external users access your systems with their own credentials.

    7. Credential Management Systems

    • Definition: Tools that securely store, rotate, and manage passwords, tokens, secrets.
    • Everyday Example: Password manager apps; locked safe for keys.
    • Technical Example: HashiCorp Vault, AWS Secrets Manager, Bitwarden.

    8. Single Sign-On (SSO)

    • Definition: One login gives access to many apps—reducing password overload.
    • Everyday Example: One work account opens email, drive, HR portal.
    • Technical Example: Okta, Google Workspace, Azure AD SSO.

    9. Just-In-Time (JIT) Access

    • Definition: Temporary access granted only when needed—no standing admin rights.
    • Everyday Example: Visitor badge that only works for a meeting’s time slot.
    • Technical Example: Admin access valid for 1 hour, auto-expires, logs every action.

    Visual Placeholder: “Identity Journey Workflow”

    Each step is a checkpoint: Who are you? Should you be here? Are you still supposed to be here?

    Real-World Case Study

    Failure — The “Forever Admin” Problem

    • Situation: A developer joined a cloud team and was granted admin access. Even after moving to a new role, her access was never removed.
    • Impact: When her credentials were later phished, attackers gained “god mode” over production.
    • Lesson: Strong identity strategy means no one keeps access they no longer need—groups, roles, and JIT should be used together.

    Success — Smart Proofing + Just-In-Time Access

    • Situation: A fintech required identity proofing (government ID upload + HR validation), then assigned minimum roles. Admin access was “Just-In-Time”—granted only for a specific job and auto-revoked after an hour.
    • Impact: Even when attackers tried to socially engineer help desk, they hit a wall: no standing admin accounts to steal.
    • Lesson: Smart onboarding plus temporary privileges shrink both risk and audit effort.

    Action Framework — Prevent → Detect → Respond

    Prevent

    • Require identity proofing before creating any new account.
    • Assign users/devices/services to groups/roles—never “everyone” access.
    • Use strong authentication (MFA, passwordless) for all critical systems.
    • Implement JIT for high-risk privileges—don’t leave “always-on” admin access.
    • Centralize secrets/passwords in a vault with rotation.

    Detect

    • Monitor for failed logins, new devices, new locations.
    • Alert on stale sessions or standing privileges.
    • Log and review all admin and sensitive actions.

    Respond

    • Quickly revoke compromised or unused accounts.
    • Rotate credentials after suspected exposure.
    • Audit and clean up over-privileged or “ghost” users/devices.
    • Review onboarding/offboarding after any incident.

    Key Differences to Keep in Mind

    DifferenceOne-Line ExplanationExample Scenario
    Authentication vs AuthorizationWho are you? vs What can you do?You log in, but only see your files
    Group/Role vs. IndividualEasier, safer management for scaleAll HR staff can approve timesheets
    SSO vs StandaloneOne login for all vs many passwordsOkta/Google SSO vs app-by-app logins
    Standing Privilege vs JITAlways-on admin is riskyTemporary admin for a set task
    Manual Credentials vs VaultSpreadsheets are riskySecrets in password manager/vault

    Summary Table

    ConceptWhat it MeansEveryday ExampleTechnical Example
    Groups & RolesBundle permissionsStaff badge by jobAWS IAM roles, AD groups
    AuthenticationProve who you areFace unlockMFA, passwordless
    AuthorizationWhat you can doLibrary borrow limitsRBAC/ABAC policies
    Session MgmtManage access windowPark wristband expiresSession timeout, MFA
    ProofingVet new identitiesShow driver’s licenseKYC, onboarding
    FIMTrust external logins“Login with Google”SAML, OIDC
    Credential MgmtStore secrets safelyLocked safePassword vaults
    SSOOne login, many appsMaster keyOkta, Azure AD SSO
    JITTemporary accessVisitor badgeEphemeral admin rights

    What’s Next

    You now know how to verify who gets in, and how to make sure only the right people/devices/services are allowed through your doors.
    Next up: Access control in action—how to set and enforce the right permissions, monitor use, and spot risky changes before they lead to trouble.

    🌞 The Last Sun Rays…

    Don’t just hand out keys—check IDs, set boundaries, and regularly review who’s inside.
    Challenge: Review your own logins, devices, or admin access.
    What’s the “oldest” account or privilege you still have?
    Could someone still get in after they shouldn’t?

  • IAM Blog Series, Part 1:The First Step in Controlling Access

    Mapping Your Doors: The First Step in Controlling Access to Everything You Own

    Imagine you’re protecting a building. Would you hand out keys before you know where every door and window is?
    The same goes for cybersecurity: before deciding who can get in, you must know what you’re protecting and where the entry points are—both physical and digital.
    Yet this is where many IAM programs stumble:
    Many teams rush into tool selection—buying software or setting up permissions—without first mapping their real entry points. The result? Missed doors, lingering risks, and controls that don’t truly fit the environment.

    Why It’s Needed (Context)

    No matter your size or industry, your organization depends on a mix of valuable things—data, systems, devices, offices, apps, and background services.
    You can’t control who gets in until you know what you have and where someone could enter.
    That’s why every strong identity and access management (IAM) program begins with a simple but powerful step: mapping your assets and their doors.

    Core Concepts Explained Simply

    For each type of asset, here’s what it means, a simple real-life example, and how to protect it physically and digitally:

    Information

    • What it is: All your important data, from digital files to printed records.
    • Everyday Example: Your diary, work folders, or saved documents.
    • How to protect:
      • Physical: Locked cabinets for paper records.
      • Logical: Passwords and file permissions for digital data.

    Systems

    • What it is: The servers and software that make your business work.
    • Everyday Example: The family computer or your office network.
    • How to protect:
      • Physical: Servers stored in locked rooms.
      • Logical: Restrict who can log in or make changes.

    Devices

    • What it is: Laptops, phones, tablets, printers, and network devices.
    • Everyday Example: Your personal laptop or a company phone.
    • How to protect:
      • Physical: Cable locks, safe storage.
      • Logical: PIN codes, encryption, remote wipe.

    Facilities

    • What it is: Offices, rooms, and buildings where people work or equipment lives.
    • Everyday Example: An office front door or storage closet.
    • How to protect:
      • Physical: Locks, security badges, cameras.
      • Logical: Visitor logs or electronic access systems.

    Applications

    • What it is: Software you use to get work done (email, finance, customer management).
    • Everyday Example: Logging into your company’s payroll app.
    • How to protect:
      • Logical: User accounts, permissions, and access restrictions.

    Services

    • What it is: Background systems like printing, cloud storage, payment gateways.
    • Everyday Example: Printing at the office or sharing files in the cloud.
    • How to protect:
      • Logical: Limit who can use these services and monitor usage.

    Real-World Case Study

    When One Unlocked Door Was All It Took
    A company kept its server in an unlocked office. One night, someone simply walked in and took the server. The best passwords couldn’t help—the thief had the equipment in their hands.
    Lesson: Physical security is just as important as digital security.

    When Every Door Had a Lock
    A clinic stored patient records on a computer in a locked room, and only trusted staff had the key and the password. Even if someone entered the building, they couldn’t access the records without both.
    Lesson: The best protection comes from combining both physical and logical security.

    Action Framework — Prevent → Detect → Respond

    Prevent

    • List all your important assets (data, systems, devices, facilities, apps, services).
    • Identify every entrance—doors, cabinets, login screens, admin panels.
    • Add locks: use physical locks where needed and passwords/permissions for digital access.

    Detect

    • Keep logs of visitors and digital access.
    • Watch for unusual events: unlocked doors, strange logins, or missing items.

    Respond

    • Fix gaps: add missing locks, reset passwords, or change who has access.
    • Act fast if something goes wrong: block accounts, check cameras, or restore from backups.
    • Regularly review your list—new “doors” appear as you add new tools and spaces.

    Key Differences to Keep in Mind

    What’s Different?Quick ExplanationExample Scenario
    Physical vs LogicalReal locks vs digital checksLocked door vs login password
    Device vs SystemSingle gadget vs big setupLost phone vs breached company server
    Facility vs ApplicationPlace vs softwareLocked office vs payroll app login

    Summary Table

    AssetEveryday ExamplePhysical ControlLogical Control
    InformationWork folder, filesLocked cabinetPassword, file permissions
    SystemsComputer serverLocked server roomAdmin account
    DevicesLaptop, phoneCable lock, safe placePIN, encryption
    FacilitiesOffice, storage roomDoor lock, badge entryVisitor log
    ApplicationsPayroll app, email(N/A)User accounts, permissions
    ServicesPrinting, cloud files(N/A)User permissions

    What’s Next

    Now that you know where all your doors are, the next step is deciding who should get in—and how to verify their identity.

    In the next blog, we’ll explore how to design a smart identification and authentication strategy for people, devices, and services. You’ll learn how accounts, passwords, and multi-factor authentication work together to build a secure access framework.

    Stay tuned for Part 2: Designing Your Identification and Authentication Strategy — Who Gets In and How You’ll Verify Their Identity.


    🌞 The Last Sun Rays…

    Before you hand out any keys, make sure you’ve found and secured every door—physical and digital.
    Challenge: Pick one asset (a device, a room, or a digital system) and ask, “How could someone get in?”
    What’s the easiest door to break through—and what’s one step you can take today to make it safer?