In this video, you will learn about some important concepts and definitions in identity and access management. Once you have watched the video, take the concept of identifying and giving …
In this video, you will be introduced to three other control models, role-based access control (RBAC), rule-based access control (RAC), and attribute-based access control (ABAC). Reflect and share: Which of …
In this video, you will learn about security perimeters in the digital space. Once you’ve watched the video, think about how you might approach the following: How would you define …
In this video, you will learn more about discretionary access control (DAC) and mandatory access control (MAC). These two models will be compared in terms of its benefits and limitations. …
In this video, you will learn about the different types of access controls systems. Each access control system has its benefits and is appropriate for different work environments. Reflect and …
In this video, you will learn about assets in the context of IdAM. We can no longer think of assets as existing purely in the physical realm, we now need …
In this video, you will learn about the last type of permission, privilege granularity. Privilege granularity allows you to tailor permissions appropriately and manage inherited permissions. Reflect and share: Domain …
In this video, you will learn about centralized accounting. Centralized accounting will help you to: log review processes log aggregation improve business intelligence
In this video, you will learn about the different types of permissions, specifically data visibility and inherited permissions. Data visibility refers to whether certain files, information or functionality is visible …
In this video, you will learn about accounting considerations. Effective identity authentication and authorization should result in high data logging accountability. Investigate and share: Review your own accounting approach in …
In this video, you will learn about security kernels; that is, the reference monitor that mediates access. Every security must do the following: isolate processes mediate all access provide a …
In this video, you will learn what authorization is in the context of IdAM. Importantly, authorization is different to authentication. In the IdAM context, authorization refers to the function of …
In this video, you will learn about adaptive authorization and how it is used. For example, if an employee accesses a network via a VPN instead of their unmasked IP …
In this video, you will learn more about privileged access and what tools you can use to manage this. Here are three tips to take forward: minimise credentials minimise usage …
In this video, you will learn about different service standards needed for IdAM. The customer and customer service provider perspectives are considered. Reflect and share: Considering your own situation, are …