CISSP Domain 5: Cloud identity management and access control

Last updated:December 2017

Security School

Browse Sections

Editor's note

When someone knocks on your door at home, it's unlikely you'll let them in sight unseen. You may peek out the window first to see if you recognize them. If it’s an unknown visitor purporting to represent a legitimate entity, such as a repairman, you might verify their identity before granting entry and then restrict which parts of the house they can access. The same caution and discretion is needed to properly protect physical and digital assets in the enterprise. But instead of a window or door, on-premises and cloud identity and access management systems help infosec pros get the job done.

In this Security School, based on (ISC)² CISSP training material on Domain 5 of the exam, find out how to control physical and logical access to resources, manage identification and authentication, deploy cloud identity and access management services, avoid access control attacks and more. In his two-part tip series, expert Adam Gordon provides a deep dive into different types of access control attacks and ways to avert or mitigate these threats in the enterprise. Preventing this type of malicious activity requires strong password policies and practices, he explains. In his video, Gordon walks viewers through how to integrate third-party cloud identity and access management services into their enterprise security strategy.

Once you've reviewed the parts of this Security School on these core concepts of Domain 5, take the quiz to see how much you have learned about identity and access management systems and best practices.  

View our Security School Course Catalog to view more schools.

CISSP® is a registered mark of (ISC)², Inc.

1A closer look at on-prem and cloud identity and access management

People and devices shouldn’t have unrestricted access to enterprise resources Domain 5 of the CISSP exam assesses your understanding of on-premises and cloud identity and access management systems and how they can be used to prevent unauthorized access to resources and applications.

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close