Useful Links
Computer Science
Cloud Computing
Cloud Security
1. Foundations of Cloud Security
2. Cloud Governance and Risk Management
3. Identity and Access Management (IAM)
4. Infrastructure Security
5. Data Protection and Encryption
6. Application Security
7. Security Operations and Monitoring
8. DevSecOps and Automation
9. Emerging Technologies and Advanced Topics
Identity and Access Management (IAM)
IAM Fundamentals
Identity Concepts
Digital Identity
Identity Lifecycle
Identity Proofing
Access Control Principles
Principle of Least Privilege
Separation of Duties
Need-to-Know Basis
Defense in Depth
Zero Trust Architecture
Never Trust, Always Verify
Least Privilege Access
Assume Breach Mentality
Identity Management
User Identity Management
User Provisioning
User Deprovisioning
Account Lifecycle Management
Service Identity Management
Service Accounts
Application Identities
Machine Identities
Identity Stores and Directories
Active Directory Integration
LDAP Directories
Cloud Identity Providers
Identity Federation
Cross-Domain Identity Management
Trust Relationships
Identity Mapping
Authentication Methods
Password-Based Authentication
Password Policies
Password Storage Security
Password Recovery Mechanisms
Multi-Factor Authentication (MFA)
Something You Know
Something You Have
Something You Are
Adaptive Authentication
Passwordless Authentication
Biometric Authentication
Hardware Tokens
Certificate-Based Authentication
API Authentication
API Keys
OAuth 2.0
JSON Web Tokens (JWT)
Authorization and Access Control
Access Control Models
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Permission Management
Permission Assignment
Permission Inheritance
Permission Auditing
Policy Management
Policy Definition
Policy Enforcement
Policy as Code
Federated Identity and Single Sign-On
Federation Protocols
Security Assertion Markup Language (SAML)
OpenID Connect (OIDC)
WS-Federation
Single Sign-On Implementation
SSO Architecture
Identity Provider Configuration
Service Provider Integration
Cross-Cloud Identity Federation
Multi-Cloud Identity Management
Hybrid Identity Solutions
Privileged Access Management
Privileged Account Security
Administrative Account Management
Privileged Session Management
Just-in-Time Access
Secrets Management
Secret Storage
Secret Rotation
Secret Distribution
Privileged Access Monitoring
Session Recording
Activity Monitoring
Anomaly Detection
Previous
2. Cloud Governance and Risk Management
Go to top
Next
4. Infrastructure Security