O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter has covered some foundational concepts in access management. In a nutshell, the access management layer consists of authentication and authorization as key processes. Access control is facilitated by way of access control models and mechanisms. Accountability aspects such as logging, monitoring, and audits play a vital role in ensuring security.

In the next two chapters, we will cover security assessment concepts and security testing methods.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required