CISM

Course
Time
8 hours 39 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:03
all right. Now, the next way, we're gonna protect our network and our information in our environment is we're going to be very restrictive of who gets access to that environment, and that's where identity and access management comes in.
00:17
So with identity and access management, it's all about who gets an account in our environment,
00:24
how that account is created,
00:28
how the user's then gonna take that account information, identify themselves to a system. They're gonna prove that information,
00:36
and then they're gonna be authorized to access certain features
00:40
or functions.
00:42
Um then, of course, users are audited, they're held accountable, and then our accounts are ultimately gonna be de provisioned. So this is identity and access management. Again, we don't really need to get in depth. But the first stage identity proofing before I'd ever let you on my network
01:00
proved to me
01:02
your identity. Show me your driver's license, your social Security card. Think about all the things you have to do before getting hired with the company. And then once you're hired, before you'd ever get an account, right? So you're going through the phase of identity proofing your proof. You're providing proof of your identity
01:21
now, once I believe that I'm going to create an account for you.
01:25
That's the provisioning peace. It would be great if we automatically provisioned accounts. So, for instance, when you come on board nine or your information into our HR database would be great if that information was pulled over to active directory and you were automatically created an account based on what we enter
01:44
right, that makes it very, very smooth for administrators.
01:48
Once you have your account as a user, when you attempt to access a resource, you go through the eye triple a identification, authentication, authorization and auditing.
02:00
So identification. You make a claim, your user name and account number and I p address a Mac address. However you make your claim, but it claim it's no good cause claims air very easily spoofed right. I mean, I can claim to be administrator. That doesn't mean I am.
02:20
So we have to provide proof and that's authentication. So identification Make a claim authentication. Prove it,
02:29
prove it to me
02:30
and we authenticate with something. I know
02:35
something I have
02:37
or something I am.
02:38
So I know a password.
02:42
I have a key.
02:44
I am Kelly Hander hand based on my biometrics right thumb print, retina scan, hand geometry, whatever
02:51
the best and strongest authentication is multi factor.
02:55
Not multiple things, but a combination of types. So it's something I know in a something I have
03:04
something I have and something I am
03:06
something I am something I know. So like a driver's license and passport that would not be multi factor. They're both something I have,
03:14
but a retina scan in depend.
03:16
That's multi factor.
03:19
All right, now, once you've proven your identity, your then authorized based on who you are, So authorization is all about getting your rights and permissions assigned to you.
03:32
Now,
03:34
when we create an account, when we're crate creating accounts that are based on you as an individual or me as an individual, so I'm Kelly Hander hand I get the account
03:46
que handwriting, right.
03:47
Um, the problem with that in an environment is the longer I'm in the company and the moron move from department to department or within the organization.
03:59
What tends to happen is I accumulate rights and permissions. We sometimes call that privilege creep.
04:04
So with identity based accounts, you know when you move, you just tend to keep and continue to accumulate, so role based access control is a really is A is a better way to control what users are authorized to do.
04:21
So instead of Kelly Hander Han, I'm granted access to an account called Trainer one.
04:27
Um, when I'm done being trainer. Wanna move to sales? I'm given sales one
04:32
that way. My permissions from before don't follow me. And I'll tell you on the exam. There is a big preference placed on role based access control because it really can limit privilege creep in abusive privileges.
04:46
All right, so identify Kelly H. I prove it. Here's my thumbprint. My password, I'm authorized to gain certain resource is and then auditing or accountability just simply means that actions that happen can be traced to an individual.
05:04
And then all good things must come to an end. At that point in time, perhaps when I leave the organization, my account would be de provisions

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor