Skip to Content
Cybersecurity Blue Team Toolkit
book

Cybersecurity Blue Team Toolkit

by Nadean H. Tanner
April 2019
Beginner to intermediate
288 pages
7h 20m
English
Wiley
Content preview from Cybersecurity Blue Team Toolkit

CHAPTER 8Access Management

WHAT YOU WILL LEARN IN THIS CHAPTER:

  • Authentication, Authorization, and Auditing
  • Least Privilege
  • Single Sign‐On
  • JumpCloud

Let's take a trip through an airport. You have to produce identification to authenticate you are who you say you are. Then you have to provide a ticket to an agent to access the boarding area. Your belongings are screened to make sure you're not bringing any malicious contraband with you into a secured area. When you board the plane, they scan your ticket to prove you gained access to the aircraft. Now the airline can track and audit if and when you traveled. This is fundamental access management. Now take the same concept and apply it to a networked environment.

With all these layers of access management, how often do we hear of people getting past security? What other layers of security are in place at an airport that you have not even considered? As a security professional, you become acutely aware of those layers of defense in depth. You always have to be thinking strategically and protectively and asking targeted questions. What if someone is impersonating another on my network? What if someone has too much access? What if someone does access the network but has brought ransomware along?

Access management makes system or network administrators think about how people log into their computers and network. Most users don't realize there is a difference between logging in with domain credentials versus logging directly into an ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity Attacks- Red Team Strategies

Cybersecurity Attacks- Red Team Strategies

Johann Rehberger

Publisher Resources

ISBN: 9781119552932Purchase book