Fundamentals
IAM Stands for
Identity & Access Management
what is authentication?
The process of verifying a user's identity.
Guess JML means
Joiner-Mover-Leaver
What is authentication
The process of verifying a user's identity.
Why is IAM important for cybersecurity
t helps prevent unauthorized access, data breaches, and ensures compliance.
What is SSO and how does it help users?
Allowing users to access multiple systems with one login?
What is a birthright access?
Default access granted to users based on their role or department when they join an organization.
Main purpose of enforcing password complexity policies?
To reduce the risk of password guessing or brute-force attacks.
What is an identity in IAM
A unique representation of a user, system, or service that needs access to resources.
What is authorization
The process of determining what resources a user is allowed to access.
What is an access request workflow?
A predefined process that governs how users request, approve, and receive access to systems or applications.
What is an access review
A periodic check to ensure users have appropriate access rights.
What is the impact of non-compliance with IAM policies?
It can lead to security breaches, regulatory fines, and reputational damage.
The process of giving a user access to a system called
Provisioning
What is the Principle of Least Privilege?
Users should only have the minimum access necessary to perform their job.
What is an orphaned account in IAM?
An account that remains active even after the associated user has left the organization.
What is the role of IAM in achieving SOX or GDPR compliance?
Ensures proper access controls, auditability, and data protection measures are in place.
What is the main goal of IAM
Right individuals have the right access to the right resources at the right time.
Benefit of implementing Multi-Factor Authentication (MFA)
It adds an extra layer of security beyond just a password
Term for removing a user’s access
De-provisioning
What is the risk of not performing regular access reviews?
Users may retain unnecessary or excessive access, increasing security risks.
Difference between identity governance and access management?
Identity governance focuses on policies and compliance, while access management handles authentication and authorization.