Skip main navigation

Blockchain

In this video, you will learn about blockchain, a decentralized database, in the IdAM context.
6.9
Blockchain and identity and access management. Blockchain is a decentralized database. So the database is shared, there is no single owner of that database. And here, the database can be added to but cannot be edited. So this gives us a very strong level of auditability. So we hear a lot about Blockchain, typically referencing cryptocurrencies. Whether it has value as a currency or not, we can argue, but Blockchain, as a tool, as a technology, has many uses. And we’re going to continue to see these evolve and to be applied in different ways. So this is similar to cypher blockchaining. Each block of data is linked to the next. Each block is fixed once it’s added and cannot be changed.
55.7
So this is a very strong model for audits, for archiving, and for logs, which links to some of the things we’ve talked about with identity and access management. Given that it has integrity controls, the decentralization can occur and trust becomes less of an issue. It doesn’t matter who holds a copy of the database. So this can also help with transparency. There isn’t, in this model, an equivalent. If we think about PKI, we have a certificate authority, a trusted third party. With this model, there is no single trusted entity. We have a distributed ledger and we have integrity control throughout. So this is a very strong model.
96.6
So the potential here is for a peer-provided identity and access management system, but it is probably some way off. But we have the ability to control, the inability to delete entries, which may be a strength. But how would this face some of the issues we’ve got around privacy legislation and the right to be forgotten? With Blockchain, there is also some issue around the speed of replication and the speed of conversion. And we know that Blockchain is computationally intensive in terms of, and it scales very.. it grows very quickly in terms of the computational process required.
144.7
So we’re looking at our second case study at how Blockchain might relate to an existing government to citizen service, though. We’ll reference an existing government-citizen service and how, actually, the transparency offered by Blockchain, the auditing capability offered by Blockchain actually does kind of have parallels with some existing solutions that may hint at where Blockchain will develop. So for this section, by way of summary, we have services and standards relating to identity and access management that continue to evolve rapidly, they offer new capabilities and services. And the big problem for us as professionals is understanding them, assessing them, and making sure that they have a strategic fit from a technological perspective, from a governance perspective.
198.3
And when we say governance, we’re talking about our internal policies, processes, our internal mission for the company, but also any regulatory or legislative requirements that we’re required to meet. So this evolution is also driven by the need to address the continued emergence of threats. And any of these new services may help us in addressing threats. But we also need to recognize that they may be part of a problem in terms of generating new problems that require addressing as well. OK, I hope you enjoyed this. in the next section, we will look at the implementation of an identity and access management solution. So over the previous nine sections, we’ve looked at the theory behind identity and access management.
245.1
And during section 10, we’ll look at the implementation, before in section 11 looking at the technologies within identity and access management. OK, thanks for your time. See you next time.

In this video, you will learn about blockchain, a decentralized database, in the IdAM context.

Once you have watched the video, consider the following challenges that you will need to be aware of:

  • the challenge for professionals in the IdAM context is to understand, assess and ensure that the services and standards used are appropriate and have strategic fit from a technological and governance perspective
  • part of these challenges is also that these services and standards are evolving over time, which is driven by the need to meet the continued emergence of threats
  • a hidden challenge is also keeping an eye out for the potential problems that implementing new services and standards create
This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education