Core Authentication Methods and Mechanisms
Authentication verifies that a user is who they claim to be. It forms the first line of defense in identity and access management. The CISSP exam requires knowledge of multiple authentication approaches, each with distinct strengths and weaknesses.
Single-Factor vs Multi-Factor Authentication
Single-factor authentication relies on one verification method, typically something you know like a password. Multi-factor authentication (MFA) combines multiple factors from different categories:
- Something you know (passwords, PINs)
- Something you have (hardware tokens, smart cards)
- Something you are (biometrics like fingerprints or facial recognition)
MFA significantly strengthens security by making unauthorized access harder, even if one factor is compromised.
Key Authentication Protocols
You must understand these core protocols for the exam:
- Kerberos: Uses tickets for authentication in network environments
- OAuth 2.0: Enables delegated access without sharing passwords
- SAML (Security Assertion Markup Language): Allows federated identity where users authenticate once and access multiple systems
Biometric Authentication Systems
The exam covers biometric metrics you should know:
- False Acceptance Rate (FAR): How often the system incorrectly accepts unauthorized users
- False Rejection Rate (FRR): How often the system incorrectly rejects authorized users
Understanding trade-offs between security strength, user convenience, and implementation cost is essential for this domain.
Access Control Models and Implementation
Access control determines what authenticated users are allowed to do within a system or organization. The CISSP curriculum covers several fundamental models you must master. Each model has distinct use cases and limitations.
Role-Based and Attribute-Based Control
Role-Based Access Control (RBAC) assigns permissions to roles rather than individual users. This makes it scalable and easier to manage in medium to large organizations. For example, a "Financial Analyst" role might view budget reports but not delete financial records.
Attribute-Based Access Control (ABAC) provides more granular control. It makes decisions based on multiple attributes:
- User attributes (role, department, clearance level)
- Resource attributes (classification, location)
- Environmental attributes (time of day, network location)
ABAC is more flexible than RBAC and better suited for dynamic environments.
Discretionary and Mandatory Control Models
Discretionary Access Control (DAC) gives resource owners the ability to control access to their resources. This is common in file systems where users set permissions themselves.
Mandatory Access Control (MAC) enforces access decisions based on security labels assigned to users and resources. This is typically used in government and military environments where data classification is critical.
Access Control Lists and Core Principles
Access Control Lists (ACLs) specify which users or groups have access to specific resources. Two critical principles guide their implementation:
- Principle of Least Privilege: Users get only minimum access necessary for their job
- Separation of Duties: Critical functions require multiple people to prevent fraud and errors
Understand how these models differ, their appropriate use cases, and their limitations for exam success.
Identity Governance and Lifecycle Management
Identity governance encompasses the policies, processes, and technologies that ensure the right people have the right access at the right time. The complete identity lifecycle includes four stages: provisioning, maintenance, deprovisioning, and periodic reviews.
Provisioning and Maintenance
During provisioning, when a new employee joins, their identity must be created in all relevant systems with appropriate access rights based on their role. The exam emphasizes that onboarding processes must be both timely and secure.
Maintenance involves periodic reviews ensuring permissions remain appropriate as job responsibilities change. This includes recertification processes where managers verify their team members still need current access levels.
Deprovisioning and Access Reviews
Deprovisioning is critical when employees leave or change roles. You must promptly remove access across all systems to prevent former employees from accessing sensitive data. Failed deprovisioning is a significant security risk the exam emphasizes heavily.
Periodic access reviews, often quarterly or annually, help identify inappropriate access, privilege creep, and unnecessary accounts. These reviews should be documented and tracked.
Identity Repositories and Governance Frameworks
Identity governance frameworks should include clear policies covering:
- Who can request access
- How approval works
- Documentation requirements
- Audit trails
Identity repositories like Active Directory centralize user information and authentication. Understanding how to integrate multiple identity sources and maintain data consistency across systems is important for real-world IAM implementation.
Privileged Access Management and Monitoring
Privileged Access Management (PAM) addresses security challenges of managing accounts with elevated permissions. Administrative accounts, service accounts, and other privileged accounts require special attention because their compromise can lead to complete system takeover.
Credential Management and Session Recording
The exam requires understanding password vaults or secret management systems that securely store privileged credentials and control access to them. These systems generate audit trails showing when credentials were accessed and by whom, providing accountability.
Session recording and monitoring ensure that all activities performed using privileged accounts are captured for later review and investigation.
Just-in-Time Access and Least Privilege
Just-in-Time (JIT) access provisioning is a modern PAM practice where privileged access is granted temporarily for specific tasks rather than permanently assigned. This reduces the window of vulnerability significantly.
The principle of least privilege applies especially to privileged accounts. Administrative staff should use regular accounts for daily work and only elevate privileges when necessary.
Monitoring, Rotation, and Account Types
The exam covers monitoring and alerting for suspicious privileged account activity:
- Access attempts outside normal hours
- Logins from unusual locations
- Unusual command patterns
Password rotation requirements for privileged accounts are more stringent than regular accounts, often requiring more frequent changes. Individual accounts with administrative permissions are preferred over shared administrative accounts for accountability and auditing.
Service accounts require special management because applications use them to access databases and systems. They often run unattended with static passwords, requiring secure storage in credential vaults.
Compliance, Standards, and Best Practices in IAM
The CISSP IAM domain encompasses regulatory and compliance requirements organizations must meet. Different industries and jurisdictions have varying requirements for identity and access management.
Key Compliance Frameworks
Understand how these frameworks drive IAM implementation:
- HIPAA: Healthcare organizations must implement access controls ensuring only authorized personnel access patient data
- PCI DSS: Mandates strict access controls for payment card data, including unique user IDs and strong authentication
- GDPR: Requires organizations to manage identity data properly and grant individuals the right to know how their data is used
- SOC 2: Requires controls over logical access and audit trails of access activities
Best Practices and Core Controls
Account management policies should cover:
- Minimum password lengths
- Complexity requirements
- Password expiration periods
- Restrictions on password reuse
The exam emphasizes balancing security with usability because overly restrictive policies lead users to work around controls. Segregation of duties ensures no single person performs critical functions without approval from another. This is particularly important in financial systems.
Monitoring and Continuous Improvement
Audit logging and monitoring provide detective controls that help identify breaches after they occur. Regular testing through penetration testing and vulnerability assessments helps identify weaknesses before attackers exploit them.
Continuous monitoring has become increasingly important. Organizations now move away from periodic reviews toward real-time detection of suspicious access patterns using:
- Security Information and Event Management (SIEM) systems
- User and Entity Behavior Analytics (UEBA)
