Risk Management & Identity

Key Topics Studied

  • Identity & Access Management
    • Single Sign-On (SSO): one login grants access to multiple systems.
      • Advantage: convenience, reduced password fatigue.
      • Disadvantage: compromise = maximum exposure.
    • Authentication methods: smart cards, biometrics, Kerberos, LDAP, Active Directory, SAML.
    • Federation: transitive trust across multiple enterprises.
  • PKI Concepts
    • Certificate chaining: trust relationship from root CA down to intermediates.
    • Key escrow: third party stores copies of private keys for recovery.
    • Certificate revocation: CRLs identify invalid certs before expiry.
    • Key pairing: every public key uniquely maps to a private key.
  • Indicators of Compromise (IoCs)
    • Impossible travel: logins from geographically distant places in impossible timeframes (e.g., New York → Tokyo in 20 seconds).
    • Concurrent session usage: multiple simultaneous logins on one account.
    • Resource consumption: bandwidth/disk exhaustion.
    • Blocked content: firewalls filtering malicious activity.
  • Risk Management
    • Senior management responsibility: expressing risk tolerance / appetite.
    • Risk owner: selects treatment options (accept, mitigate, transfer, avoid).
    • Risk practitioner: performs assessments.
    • Security management: establishes cybersecurity controls.