CCSK Domain 5 — Identity & Access Management

Why IAM Matters in Cloud

IAM is the new perimeter in cloud security.

Most cloud breaches happen due to misconfigured IAM (too much access or weak authentication).

How IAM Differs in Cloud

PointMeaning
Spans multiple organizationsUsers access many cloud services; trust must extend across orgs.
Different IAM models per CSPAWS IAM ≠ Azure AD ≠ GCP IAM. Adds complexity.
Unified cloud consoles exposed to internetMakes misconfiguration dangerous.

Result: Identity Federation becomes necessary and privileged access must be tightly controlled.

Key IAM Terms

TermMeaning
IdentityWho the entity is (attributes).
AuthenticationProving the identity (password, OTP, biometric).
AuthorizationWhat the identity is allowed to do.
EntitlementsMapping identities to permissions.
RoleA set of permissions based on job or function.
EntityUser, service, device, app accessing the system.
PersonaCategorizing user types to assign roles.

Access Control Models

ModelIdeaGood for
RBAC (Role-Based)Access based on job rolesStandard enterprise use
ABAC (Attribute-Based)Access depends on attributes (user + device + resource + context)Dynamic, zero-trust
PBAC (Policy-Based)Access decision defined in machine-readable policiesLarge-scale cloud environments

Exam Trick: PBAC enforces RBAC and ABAC via policies.

Identity Federation & SSO

Allows users to log in once and access multiple services.

TermMeaning
IdP (Identity Provider)Authenticates the user (e.g., Azure AD, Okta).
Relying Party / Service ProviderAccepts user identity from IdP (e.g., Salesforce).
AssertionThe identity information IdP sends to the RP.

Common Federation Protocols

ProtocolUseNotes
SAMLEnterprise SSOXML, mainly browser-based web apps
OAuth 2.0Authorization for APIsDoes not authenticate identity
OIDCAuthentication on top of OAuthCommon for modern cloud/mobile apps

Exam Tip:

  • OAuth = Authorization
  • OIDC = Authentication
  • SAML = Enterprise Web SSO

Identity Architecture Approaches

ModelDescriptionProsCons
Hub-and-SpokeCentral broker connects to all servicesStrong governanceNeeds central IdP setup
Free-formDirect connection from internal directory to cloudSimple initiallyHard to scale, weak governance

Authentication (MFA is Mandatory in Cloud)

Types of MFA:

TypeStrengthNotes
Hard TokenStrongestHardware security key (e.g., YubiKey)
Soft Token (TOTP Apps)StrongGoogle Authenticator, Authy
SMS OTPWeakVulnerable to SIM swap
BiometricsMediumDepends on device security

Passwordless: FIDO / Passkeys → resistant to phishing

BUT: Not recommended for cloud admin accounts.

Authorization & Entitlements in Cloud

  • Use least privilege
  • Grant just-in-time (JIT) access for admins
  • Review roles and privileges regularly
  • Use resource tagging to enable ABAC

Privileged Identity & Access Management (PIM & PAM)

TermPurpose
PIMManages who is a privileged user
PAMControls how they access systems

Key Features:

  • MFA required
  • Session recording
  • Credential vaulting
  • Temporary admin privileges (no permanent admin accounts)

Golden Exam Takeaways

  • Identity is the new security boundary in cloud.
  • SSO + Federation reduce credential sprawl.
  • Always use MFA for cloud access.
  • Prefer PBAC + ABAC for cloud scalability.
  • Use PIM/PAM to control high-privilege accounts.
  • Avoid overly broad IAM policies (e.g., “*:*”).

Flashcards for practice: https://quizlet.com/in/1108708277/ccsk-domain-5-iam-flash-cards/?i=4jehw4&x=1jqt


Discover more from Information Security Blogs

Subscribe to get the latest posts sent to your email.

Leave a comment

Discover more from Information Security Blogs

Subscribe now to keep reading and get access to the full archive.

Continue reading