Site icon TheCyberThrone

CISSP Playbook – Domain 5: Identity and Access Management

Advertisements

Identity Is the New Perimeter. Govern It Like One.

Identity & Access Management – A CISO Operating Guide

By Praveen Kumar | TheCyberThrone

Scope Note

This playbook covers the complete Domain 5 landscape — governance, architecture, protocols, access models, lifecycle management, and exam decision rules.
Built for the security professional who needs both the mindset and the technical depth to pass the exam and operate in the real world.

Purpose of Domain 5

Domain 5 is about who gets access, how that access is proven, what they are allowed to do, and how every action is tied back to an accountable identity.

Domain 5 mindset:
“Access is not a convenience. It is a controlled risk decision.”

This domain tests policy thinking and architecture judgment, not protocol memorization.

Executive Context

Identity failures are not technical failures.
They are governance failures that manifest as technical events.

When Domain 5 fails in the real world:

Former employees retain access months after departure
Privileged accounts are shared across administrators
Access rights accumulate silently as roles change
No one can answer: who has access to what, and why?

The question Domain 5 forces every organization to answer:
“Can you prove that every identity with access today deserves that access today?”

If the answer is uncertain — Domain 5 has already failed.

1. Core Objectives of Identity & Access Management

IAM exists to ensure:

Key truth:

Most insider threats do not exploit zero-days — they exploit excessive access that was never removed.

2. The IAAA Framework

Everything in Domain 5 maps back to four concepts:

Identification

Authentication

Authorization

Accountability

CISSP rule:
All four must work together. Any gap breaks the chain.

3. Authentication Factors & Mechanisms

The Three Classic Factors

Exam trap:
Two passwords is NOT multi-factor. Factors must be different types.

Biometrics

CISSP mindset:
FAR and FRR trade off against each other. You cannot minimize both simultaneously.

Single Sign-On (SSO)

Design principle:
SSO must be protected with strong authentication at the entry point.

4. Identity Protocols You Must Understand

Kerberos

CISSP exam reality:
Understand the flow and trust model — not the packet structure.

RADIUS vs TACACS+

Design rule:
TACACS+ for device administration. RADIUS for network access authentication.

SAML / OAuth / OIDC

Exam trap:
OAuth is not an authentication protocol. OIDC is.

5. Identity Lifecycle Management

Provisioning

Maintenance

Deprovisioning

Access Recertification

Key truth:

Privilege creep is not a technical failure. It is a governance failure.

6. Access Control Models

You are tested on which model fits which situation — not definitions alone.

DAC — Discretionary Access Control

MAC — Mandatory Access Control

Models under MAC:

Exam anchor:
Bell-LaPadula protects secrecy. Biba protects accuracy.

RBAC — Role-Based Access Control

ABAC — Attribute-Based Access Control

CISSP mindset:
Match the model to the sensitivity and business context — not to what is easiest to deploy.

7. Privileged Access Management

Privileged accounts are the highest-value targets in any environment.

Controls:

CISSP rule:
Privileged access must be treated as a high-risk surface — not a convenience.

8. Identity Federation

Federation allows identities from one organization to be trusted by another.

Key concepts:

Design principle:
Federation extends trust boundaries. Extending trust is extending risk.

9. Physical and Logical Access Controls

Domain 5 is not just about logical systems.

Physical access considerations:

Logical access considerations:

CISSP mindset:
Physical and logical access must be aligned. Inconsistency creates exploitable gaps.

10. Monitoring, Auditing & Accountability

Access without accountability is incomplete security.

Key controls:

CISSP bias:
Logs that can be modified by the same person who generated them have no integrity value.

11. CISSP Exam Decision Rules for Domain 5

When in doubt:

  1. Choose least privilege over convenience
  2. Choose deprovisioning immediately over gradual revocation
  3. Choose MFA over single-factor for sensitive access
  4. Choose role-based access over individual assignment at scale
  5. Choose accountability over anonymity in any access model
  6. Choose policy enforcement over manual review for provisioning

Final Domain 5 Playbook Truth

“Identity is the new perimeter. If you don’t control who gets in, architecture and encryption mean nothing.”

Exit mobile version