IAM Solutions for Identification, Authentication, and Authorization
Users with access to systems must be held accountable for following policies and procedures. This is typically done by logging and monitoring system activity. Enforcing accountability in the cloud can be challenging. For example, users may access SaaS apps as they travel, which makes identifying anomalous behavior more difficult. In simple terms, identification and authentication validate a person’s identity, while authorization ensures the person in question should have access to the system or resource. Users should be granted the minimum necessary privileges to do their job, which in the security world is known as the principle of least privilege.
For the exam, you should know about cloud-based identity services such as OpenID and OAuth. These services offer a centralized and scalable solution for identification, authentication, and authorization across your cloud applications and APIs, saving you from...