Cloud Security

  1. Identity and Access Management (IAM)
    1. IAM Fundamentals
      1. Identity Concepts
        1. Digital Identity
          1. Identity Lifecycle
            1. Identity Proofing
            2. Access Control Principles
              1. Principle of Least Privilege
                1. Separation of Duties
                  1. Need-to-Know Basis
                    1. Defense in Depth
                    2. Zero Trust Architecture
                      1. Never Trust, Always Verify
                        1. Least Privilege Access
                          1. Assume Breach Mentality
                        2. Identity Management
                          1. User Identity Management
                            1. User Provisioning
                              1. User Deprovisioning
                                1. Account Lifecycle Management
                                2. Service Identity Management
                                  1. Service Accounts
                                    1. Application Identities
                                      1. Machine Identities
                                      2. Identity Stores and Directories
                                        1. Active Directory Integration
                                          1. LDAP Directories
                                            1. Cloud Identity Providers
                                            2. Identity Federation
                                              1. Cross-Domain Identity Management
                                                1. Trust Relationships
                                                  1. Identity Mapping
                                                2. Authentication Methods
                                                  1. Password-Based Authentication
                                                    1. Password Policies
                                                      1. Password Storage Security
                                                        1. Password Recovery Mechanisms
                                                        2. Multi-Factor Authentication (MFA)
                                                          1. Something You Know
                                                            1. Something You Have
                                                              1. Something You Are
                                                                1. Adaptive Authentication
                                                                2. Passwordless Authentication
                                                                  1. Biometric Authentication
                                                                    1. Hardware Tokens
                                                                      1. Certificate-Based Authentication
                                                                      2. API Authentication
                                                                        1. API Keys
                                                                          1. OAuth 2.0
                                                                            1. JSON Web Tokens (JWT)
                                                                          2. Authorization and Access Control
                                                                            1. Access Control Models
                                                                              1. Discretionary Access Control (DAC)
                                                                                1. Mandatory Access Control (MAC)
                                                                                  1. Role-Based Access Control (RBAC)
                                                                                    1. Attribute-Based Access Control (ABAC)
                                                                                    2. Permission Management
                                                                                      1. Permission Assignment
                                                                                        1. Permission Inheritance
                                                                                          1. Permission Auditing
                                                                                          2. Policy Management
                                                                                            1. Policy Definition
                                                                                              1. Policy Enforcement
                                                                                                1. Policy as Code
                                                                                              2. Federated Identity and Single Sign-On
                                                                                                1. Federation Protocols
                                                                                                  1. Security Assertion Markup Language (SAML)
                                                                                                    1. OpenID Connect (OIDC)
                                                                                                      1. WS-Federation
                                                                                                      2. Single Sign-On Implementation
                                                                                                        1. SSO Architecture
                                                                                                          1. Identity Provider Configuration
                                                                                                            1. Service Provider Integration
                                                                                                            2. Cross-Cloud Identity Federation
                                                                                                              1. Multi-Cloud Identity Management
                                                                                                                1. Hybrid Identity Solutions
                                                                                                              2. Privileged Access Management
                                                                                                                1. Privileged Account Security
                                                                                                                  1. Administrative Account Management
                                                                                                                    1. Privileged Session Management
                                                                                                                      1. Just-in-Time Access
                                                                                                                      2. Secrets Management
                                                                                                                        1. Secret Storage
                                                                                                                          1. Secret Rotation
                                                                                                                            1. Secret Distribution
                                                                                                                            2. Privileged Access Monitoring
                                                                                                                              1. Session Recording
                                                                                                                                1. Activity Monitoring
                                                                                                                                  1. Anomaly Detection