SlideShare a Scribd company logo
1 of 21
Download to read offline
Friendly Tip: Please take notes to better remember concepts
In this video we will learn
about Identification,
Identity Management
Controls & Identity
Management policies
Core Cyber Security Concepts
Architecture & Design
Identification
Identification is a set of
techniques used for carrying
out tasks such as identity
proofing and creation of a
user account in a database
Multi factor
authentication
IAM - Identity and Access Management :
This involves identifying, Authenticating and Authorizing
individuals to have access to systems or networks
IAM
Authentication Identification
User
Management/
Accounting
Authorization
Passwords
Biometrics
" It's to ensure right users
have access the right
resources at right time for
right reasons "
A network administrator is the
person designated in an
organization whose responsibility
includes maintaining computer
infrastructures with emphasis on
local area networks up to wide area
networks.
Network administrator
A Network Administrator is responsible for maintaining the server
integrity, where as the user/client is responsible for safe guarding
their login credentials.
Network administrator
This is carried out with
the use of Digital
Certificates & Smart
Cards
Single Sign-On Authentication (SSO)
Single sign-on (SSO) is an authentication method that enables users
to securely authenticate with multiple applications and websites by
using just one set of credentials.
The user authenticates their identity to an Identity provider and
after authenticating the user, the identity provider issues a token to
the user. The user can use this token as a proof of authentication
and login to avail the services, to make use of the resources.
Single Sign-On Authentication (SSO)
Background Verification
Background Verification or Background
Background Verification or Background
Background Verification or Background
check is the process of checking an
check is the process of checking an
check is the process of checking an
employee/applicant's background to
employee/applicant's background to
employee/applicant's background to
ensure that the candidate is
ensure that the candidate is
ensure that the candidate is
trustworthy, before granting access to
trustworthy, before granting access to
trustworthy, before granting access to
the systems.
the systems.
the systems. It's to make sure that the
It's to make sure that the
It's to make sure that the
candidate is not hiding any criminal
candidate is not hiding any criminal
candidate is not hiding any criminal
record or any affiliations with threat
record or any affiliations with threat
record or any affiliations with threat
actors.
actors.
actors.
Onboarding
After a candidate clears the background
check, then the organization must
decide what resources the employee
can access and allocates the clearance
according to the employee's roles &
responsibilities.
Then the account login credentials or
authentication means have to be
securely issued to the candidate. At the
end of the Onboarding Process the
employee must also be trained & made
aware of the security policy in place,
and the rules & compliance
requirements in place, to lessen the
likelihood of an incident.
Onboarding
Personnel Policies for Privilege Management
There are various personnel policies in place for
managing the employee privileges & they're as
follows.
Least Privilege Job Rotation
Mandatory Vacation
Personnel Policies for Privilege Management
Least Privilege
The idea behind Least Privilege is to grant the bare minimum
number of necessary privileges for an employee to fulfill their
responsibilities & nothing more.
This way an employee won't
have access to resources they
don't require & reduces the risk.
Personnel Policies for Privilege Management
Job Rotation
This involves the rotation of duties, roles & responsibilities to ensure
that a employee is not allowed to retain the same role for a long
time.
This policy is intended to to lessen
the likelihood of abuse of
privileges by an employee.
Personnel Policies for Privilege Management
Mandatory Vacation
The employees are forced to take a
vacation or a leave of absence as
someone else fulfills the responsibilities
that come with the role. It is especially
helpful for organizations that require
their employees to work at a highly
competent level each day.
Off-boarding
The definition of offboarding is the
process of formally separating an
employee from the organization they work
for, as a result of the employee’s
resignation, termination, or retirement.
The purpose of offboarding is to protect
the interests of both the employer and
departing employee while smoothing the
transition.
A thorough
offboarding process
has many steps. It
includes all of the
policies & procedures
that need to be
followed so there are
no loose ends after
the employee leaves.
Off-boarding
Off-boarding Procedures
Exit interviews are use to ensure
that the employees depart from
the organization in a graceful
manner. It's to collect feedback,
take note of the employee's
thoughts before leaving.
-> Exit Interview
Off-boarding Procedures
-> Disabling the employee Account
Before letting an employee
leave,The employee's
privileges have to be revoked
& the user account must be
disabled/suspended to
reduce security risk.
Off-boarding Procedures
-> Recovery of Company Assets
Before letting an employee leave
from their organization, the
organization must recover the assets
it issued. This includes laptops,
mobile devices, Smart cards, USB
media and other relevant assets that
the organization owns,
Off-boarding Procedures
-> Recovery of Personal Assets
Before letting an employee leave from
their organization, the organization must
make sure that the employee is no longer
in possession of the sensitive data. The
employee must agree to not disclose any
sensitive information & any data with the
the employee must be deleted.
https://en.wikipedia.org/wiki/Network_administrator
https://www.onelogin.com/learn/how-single-sign-on-works
https://www.bamboohr.com/hr-glossary/offboarding/
Sources :

More Related Content

Similar to Identity Management Controls.pdf

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
Goodbye Payroll Headaches. Hello, Payroll Outsourcing!
Goodbye Payroll Headaches. Hello, Payroll Outsourcing!Goodbye Payroll Headaches. Hello, Payroll Outsourcing!
Goodbye Payroll Headaches. Hello, Payroll Outsourcing!Exela HR Solutions
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxShreeveni
 
Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfAuthentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfJack Forbes
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxjaggernaoma
 
Background screening
Background screeningBackground screening
Background screeningcaptsbtyagi
 
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxRunning head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxcharisellington63520
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security BreachAbhishek Sood
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Does buying payroll software solve your payroll challenges?
Does buying payroll software solve your payroll challenges?Does buying payroll software solve your payroll challenges?
Does buying payroll software solve your payroll challenges?Paysquare Consultancy Ltd.
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptxinfosec train
 

Similar to Identity Management Controls.pdf (20)

Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Enterprise Se.docx
Enterprise Se.docxEnterprise Se.docx
Enterprise Se.docx
 
Enterprise Se.docx
Enterprise Se.docxEnterprise Se.docx
Enterprise Se.docx
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Goodbye Payroll Headaches. Hello, Payroll Outsourcing!
Goodbye Payroll Headaches. Hello, Payroll Outsourcing!Goodbye Payroll Headaches. Hello, Payroll Outsourcing!
Goodbye Payroll Headaches. Hello, Payroll Outsourcing!
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfAuthentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdf
 
Online Payroll & HRMS
Online Payroll & HRMSOnline Payroll & HRMS
Online Payroll & HRMS
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
 
Background screening
Background screeningBackground screening
Background screening
 
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxRunning head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Chapter 1 Personal security
Chapter 1  Personal securityChapter 1  Personal security
Chapter 1 Personal security
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security Breach
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Does buying payroll software solve your payroll challenges?
Does buying payroll software solve your payroll challenges?Does buying payroll software solve your payroll challenges?
Does buying payroll software solve your payroll challenges?
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
 

More from LearningwithRayYT

Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles LearningwithRayYT
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesLearningwithRayYT
 
Security concerns regarding Vulnerabilities
Security concerns regarding VulnerabilitiesSecurity concerns regarding Vulnerabilities
Security concerns regarding VulnerabilitiesLearningwithRayYT
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityLearningwithRayYT
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposuresVulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposuresLearningwithRayYT
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesLearningwithRayYT
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksLearningwithRayYT
 
Malware and Types of malwares.pdf
Malware and Types of malwares.pdfMalware and Types of malwares.pdf
Malware and Types of malwares.pdfLearningwithRayYT
 

More from LearningwithRayYT (10)

Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
 
Security concerns regarding Vulnerabilities
Security concerns regarding VulnerabilitiesSecurity concerns regarding Vulnerabilities
Security concerns regarding Vulnerabilities
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposuresVulnerability Scanning Techniques and Vulnerability scores & exposures
Vulnerability Scanning Techniques and Vulnerability scores & exposures
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer Attacks
 
Malware and Types of malwares.pdf
Malware and Types of malwares.pdfMalware and Types of malwares.pdf
Malware and Types of malwares.pdf
 

Recently uploaded

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Identity Management Controls.pdf

  • 1. Friendly Tip: Please take notes to better remember concepts In this video we will learn about Identification, Identity Management Controls & Identity Management policies Core Cyber Security Concepts Architecture & Design
  • 2. Identification Identification is a set of techniques used for carrying out tasks such as identity proofing and creation of a user account in a database
  • 3. Multi factor authentication IAM - Identity and Access Management : This involves identifying, Authenticating and Authorizing individuals to have access to systems or networks IAM Authentication Identification User Management/ Accounting Authorization Passwords Biometrics " It's to ensure right users have access the right resources at right time for right reasons "
  • 4. A network administrator is the person designated in an organization whose responsibility includes maintaining computer infrastructures with emphasis on local area networks up to wide area networks. Network administrator
  • 5. A Network Administrator is responsible for maintaining the server integrity, where as the user/client is responsible for safe guarding their login credentials. Network administrator This is carried out with the use of Digital Certificates & Smart Cards
  • 6. Single Sign-On Authentication (SSO) Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.
  • 7. The user authenticates their identity to an Identity provider and after authenticating the user, the identity provider issues a token to the user. The user can use this token as a proof of authentication and login to avail the services, to make use of the resources. Single Sign-On Authentication (SSO)
  • 8. Background Verification Background Verification or Background Background Verification or Background Background Verification or Background check is the process of checking an check is the process of checking an check is the process of checking an employee/applicant's background to employee/applicant's background to employee/applicant's background to ensure that the candidate is ensure that the candidate is ensure that the candidate is trustworthy, before granting access to trustworthy, before granting access to trustworthy, before granting access to the systems. the systems. the systems. It's to make sure that the It's to make sure that the It's to make sure that the candidate is not hiding any criminal candidate is not hiding any criminal candidate is not hiding any criminal record or any affiliations with threat record or any affiliations with threat record or any affiliations with threat actors. actors. actors.
  • 9. Onboarding After a candidate clears the background check, then the organization must decide what resources the employee can access and allocates the clearance according to the employee's roles & responsibilities.
  • 10. Then the account login credentials or authentication means have to be securely issued to the candidate. At the end of the Onboarding Process the employee must also be trained & made aware of the security policy in place, and the rules & compliance requirements in place, to lessen the likelihood of an incident. Onboarding
  • 11. Personnel Policies for Privilege Management There are various personnel policies in place for managing the employee privileges & they're as follows. Least Privilege Job Rotation Mandatory Vacation
  • 12. Personnel Policies for Privilege Management Least Privilege The idea behind Least Privilege is to grant the bare minimum number of necessary privileges for an employee to fulfill their responsibilities & nothing more. This way an employee won't have access to resources they don't require & reduces the risk.
  • 13. Personnel Policies for Privilege Management Job Rotation This involves the rotation of duties, roles & responsibilities to ensure that a employee is not allowed to retain the same role for a long time. This policy is intended to to lessen the likelihood of abuse of privileges by an employee.
  • 14. Personnel Policies for Privilege Management Mandatory Vacation The employees are forced to take a vacation or a leave of absence as someone else fulfills the responsibilities that come with the role. It is especially helpful for organizations that require their employees to work at a highly competent level each day.
  • 15. Off-boarding The definition of offboarding is the process of formally separating an employee from the organization they work for, as a result of the employee’s resignation, termination, or retirement. The purpose of offboarding is to protect the interests of both the employer and departing employee while smoothing the transition.
  • 16. A thorough offboarding process has many steps. It includes all of the policies & procedures that need to be followed so there are no loose ends after the employee leaves. Off-boarding
  • 17. Off-boarding Procedures Exit interviews are use to ensure that the employees depart from the organization in a graceful manner. It's to collect feedback, take note of the employee's thoughts before leaving. -> Exit Interview
  • 18. Off-boarding Procedures -> Disabling the employee Account Before letting an employee leave,The employee's privileges have to be revoked & the user account must be disabled/suspended to reduce security risk.
  • 19. Off-boarding Procedures -> Recovery of Company Assets Before letting an employee leave from their organization, the organization must recover the assets it issued. This includes laptops, mobile devices, Smart cards, USB media and other relevant assets that the organization owns,
  • 20. Off-boarding Procedures -> Recovery of Personal Assets Before letting an employee leave from their organization, the organization must make sure that the employee is no longer in possession of the sensitive data. The employee must agree to not disclose any sensitive information & any data with the the employee must be deleted.