Summary of "Cybersecurity Bootcamp – Day 1 (Cybersecurity Fundamentals – IAM)"

Main ideas & lessons from the session (Cybersecurity Fundamentals – Day 1: IAM)

Bootcamp structure & goals


Security fundamentals: CIA triad + security domains

What “security” is trying to achieve

Security protects:

Three major security properties (CIA triad):

Real-world examples used to explain CIA

Risk management as a foundational domain

Risk management involves:

Key principle:

Other security domains (besides IAM)

Later coverage is indicated to include:


Identity & Access Management (IAM): what it is and why it matters

IAM is treated as the “new perimeter”

Security historically focused on the network perimeter, but now identity becomes the new perimeter.

Common identity threats highlighted:

IAM core components introduced as “types” or “layers”

IAM is presented as multiple related subdomains:

  1. Identity Access Management (IAM)
    • Determines who you are and what you can do
  2. Identity Governance & Administration (IGA/IG)
    • Governs access lifecycle (who gets access, approvals, reviews, compliance)
  3. Privileged Access Management (PAM)
    • Protects privileged “keys of the kingdom” (admin/service privilege)
  4. Customer/Consumer Identity (CIM/SIМ described as consumer IAM)
    • Scales identity for millions of external users (customers/partners/vendors), optimized for UX and compliance

Detailed IAM methodology & concepts covered

1) Identity: what kinds of identities exist

2) Authentication vs Authorization (explicitly separated)

3) Authentication evolution (passwordless + MFA + passkeys)

Motivations:

MFA limitations/attacks:

Direction suggested:

4) SAML as an internal authentication approach (employee-focused)

SAML is positioned as:

Conceptual “triangular” flow:

Assertion/token answers:

Q&A emphasis:

5) OIDC/OAuth2 concepts (modern token-based authentication)

Contrast:

6) Role-Based Access Control (RBAC) and scaling access

Example used: “Sharon” as an accounting role with limited permissions.

Principles:

“Birthright access”:

7) Attribute-Based Access Control (ABAC) + Policy-Based Access Control (PBAC)

Q&A clarification:

8) Authorization “granularity” trade-off

9) AM ties to the CIA triad (explicit mapping)

10) Logging and accountability (“Accounting” in AAA)

IAM includes Authentication, Authorization, Accounting (AAA).

Accounting/logging supports:


Identity Governance & Administration (IGA/IG) content (joiner-mover-leaver)

Why IG exists

IG handles:

Core lifecycle categories

Key IG functions described

“Source of truth” and avoiding “offboarding drift”

Segregation of Duties (SoD)

IG enforces Segregation of Duties to prevent conflicts of interest:

Purpose:

Access request workflow (when not already provisioned)

Role of IG in compliance

Without IG, organizations risk:

IG is framed as necessary to satisfy auditors and consistently enforce policy-driven access.


Privileged Access Management (PAM) and “crown jewels”

Why PAM is needed

Privileged accounts are “crown jewels”.

Credential misuse/abuse is highlighted as a major breach vector. PAM helps prevent:

PAM core practices described

PAM integration with cryptographic protections


Consumer Identity Management (CIM/SIAM) content (customer-facing IAM)

Primary purpose

Scale authentication/authorization for customers, partners, vendors, external users (millions).

Emphasis:

UX/security features listed

High-level flow described

  1. User signs into an app client
  2. Redirects to an OIDC/OAuth-based system (Okta and “OIDC” referenced)
  3. After authentication, system issues:
    • Authorization code
    • Then exchanges it for tokens:
      • Identity token
      • Access token
  4. Application uses tokens to access backend resources and establish session access

Authorization differences in consumer contexts

Key constraint noted

For regulated industries (explicitly mentioned: banking/healthcare), social login may not be acceptable.


Zero Trust & how IAM/IGA/PAM connect to it

Integration message:

How IAM/IGA/PAM supports zero trust:


Detailed instruction/list elements explicitly presented (methods/practices)

Risk management approach (pillars)

Least privilege principle (how to apply)

Access control model selection guidance

IAM ↔ CIA mapping (operational practice)

IG (governance) for joiner/mover/leaver

PAM practices for privileged/admin accounts


Speakers / sources mentioned

People / primary speakers

Other referenced organizations / external sources

Vendor/tool examples referenced

Compliance/terms and tech references

SAML, OIDC, OAuth, JWT, MFA, passkeys, SOD, RBAC/ABAC/PBAC, DDoS, DLP, IDP, SP, SSO, federation, tokens/assertions, plus AES-style cryptography (mentioned).

Category ?

Educational


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video