SlideShare a Scribd company logo
Friendly Tip: Please take notes to better remember concepts
In this video we will
learn about
Implementing
Account Policies &
Authorization
Solutions
Core Cyber Security Concepts
Architecture & Design
Account Attributes
After a candidate clears background
check, and goes through the on
boarding process to be a part of the
organization, the new employee's
user account has to be managed by
the network administrator & certain
attributes are assigned to the user
account based on the roles &
responsibilities.
Access Policy
Access control is the selective
restriction of access to a place or
other resource, while access
management describes the process.
And there are various policies
determining how access control
should be carried out.
Access Password Policy Settings
This policy lists out certain norms on
password creation to ensure that
employees create & use strong
passwords. This includes factors
such as password length, it's
complexity (use of numbers &
special characters) and password
reuse .
Account Audits
User or Employee's workstation
activities should be logged & reviewed
as needed to ensure that the account
isn't being used in illegitimate ways &
maintain it's integrity.
The idea is to track all user and actions
& spot potential discrepancies .
Account Lockout
If the audit logs show signs of incident, the
information security department should be
able to immediately disable the
compromised user account at a moment's
notice to limit the potential damage cause
to the organization.
This process is is known as Account Lockout.
OATH - Open Authentication
OAuth is an open-
standard authorization
protocol or framework
that provides
applications the ability
for “secure designated
access.”
OATH - Open Authentication
For example, When logging into
Udemy you can tell Google that it’s
OK for Udemy.com to access your
profile without having to give Udemy
your Google account password.
This minimizes risk in a major way: In
the event Udemy suffers a breach,
your Google account password
remains safe.
OpenID Connect
OpenID Connect 1.0 is a simple identity layer on top of the OAuth
2.0 protocol. It allows Clients to verify the identity of the End-User
based on the authentication performed by an Authorization Server.
Sources
https://www.varonis.com/blog/what-is-oauth
https://openid.net/connect/

More Related Content

PPTX
501 ch 2 understanding iam
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PPTX
501 ch 2 understanding iam
PPTX
CyberArk
PPTX
009 Authentication and Access Control.pptx
PDF
Two-factor authentication- A sample writing _Zaman
PPT
educational content,educational content,educational content,
PDF
Govt authentication brief ca v
501 ch 2 understanding iam
The Why - Keith Graham, CTO – SecureAuth+Core Security
501 ch 2 understanding iam
CyberArk
009 Authentication and Access Control.pptx
Two-factor authentication- A sample writing _Zaman
educational content,educational content,educational content,
Govt authentication brief ca v

Similar to Implementing Account Policies & Authorization Solutions (20)

PPT
Strong Authentication - Open Source
PPT
Oath appsec sf 2015 dem rev. 2
PDF
access-control-week-2
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
The Holy Grail of IAM: Getting to Grips with Authorization
PDF
AuthN & AuthZ testing: it’s not only about the login form
PDF
Implementing Authorization
PDF
What is Authentication vs Authorization Difference? | INTROSERV
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PDF
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
PPTX
Scrubbing Your Active Directory Squeaky Clean
PDF
Auth experience - vol 1.0
PDF
The Business Case for Account Lockout Management
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPTX
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
PPTX
Authentication (AuthN) and Authorization (AuthZ)
PPTX
What is a Service Account | Understanding Service Account
PPTX
Introduccion a la seguridad Windows 7
PPTX
Broken Authentication and Authorization(1).pptx
PPTX
Essential Security Control Implementation in IT
Strong Authentication - Open Source
Oath appsec sf 2015 dem rev. 2
access-control-week-2
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
The Holy Grail of IAM: Getting to Grips with Authorization
AuthN & AuthZ testing: it’s not only about the login form
Implementing Authorization
What is Authentication vs Authorization Difference? | INTROSERV
PACE-IT, Security + 5.3: Security Controls for Account Management
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
Scrubbing Your Active Directory Squeaky Clean
Auth experience - vol 1.0
The Business Case for Account Lockout Management
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
Authentication (AuthN) and Authorization (AuthZ)
What is a Service Account | Understanding Service Account
Introduccion a la seguridad Windows 7
Broken Authentication and Authorization(1).pptx
Essential Security Control Implementation in IT
Ad

More from LearningwithRayYT (11)

PDF
Types of Threat Actors and Attack Vectors
PDF
Contrast & Compare & Contrast Information Security Roles
PDF
Compare and Contrast Security Controls and Framework Types
PDF
Identity Management Controls.pdf
PDF
Security concerns regarding Vulnerabilities
PDF
Commands used in Assessing Network layout & Security
PDF
Social Engineering Attacks & Principles
PDF
Vulnerability Scanning Techniques and Vulnerability scores & exposures
PDF
Threat Intelligence & Threat research Sources
PDF
Application Attacks & Application Layer Attacks
PDF
Malware and Types of malwares.pdf
Types of Threat Actors and Attack Vectors
Contrast & Compare & Contrast Information Security Roles
Compare and Contrast Security Controls and Framework Types
Identity Management Controls.pdf
Security concerns regarding Vulnerabilities
Commands used in Assessing Network layout & Security
Social Engineering Attacks & Principles
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Threat Intelligence & Threat research Sources
Application Attacks & Application Layer Attacks
Malware and Types of malwares.pdf
Ad

Recently uploaded (20)

PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
L1 - Introduction to python Backend.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Introduction to Artificial Intelligence
PDF
top salesforce developer skills in 2025.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
System and Network Administraation Chapter 3
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Essential Infomation Tech presentation.pptx
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
medical staffing services at VALiNTRY
PPTX
ai tools demonstartion for schools and inter college
Odoo Companies in India – Driving Business Transformation.pdf
Odoo POS Development Services by CandidRoot Solutions
L1 - Introduction to python Backend.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Introduction to Artificial Intelligence
top salesforce developer skills in 2025.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
System and Network Administraation Chapter 3
Design an Analysis of Algorithms II-SECS-1021-03
VVF-Customer-Presentation2025-Ver1.9.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Reimagine Home Health with the Power of Agentic AI​
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Essential Infomation Tech presentation.pptx
How Creative Agencies Leverage Project Management Software.pdf
Digital Strategies for Manufacturing Companies
medical staffing services at VALiNTRY
ai tools demonstartion for schools and inter college

Implementing Account Policies & Authorization Solutions

  • 1. Friendly Tip: Please take notes to better remember concepts In this video we will learn about Implementing Account Policies & Authorization Solutions Core Cyber Security Concepts Architecture & Design
  • 2. Account Attributes After a candidate clears background check, and goes through the on boarding process to be a part of the organization, the new employee's user account has to be managed by the network administrator & certain attributes are assigned to the user account based on the roles & responsibilities.
  • 3. Access Policy Access control is the selective restriction of access to a place or other resource, while access management describes the process. And there are various policies determining how access control should be carried out.
  • 4. Access Password Policy Settings This policy lists out certain norms on password creation to ensure that employees create & use strong passwords. This includes factors such as password length, it's complexity (use of numbers & special characters) and password reuse .
  • 5. Account Audits User or Employee's workstation activities should be logged & reviewed as needed to ensure that the account isn't being used in illegitimate ways & maintain it's integrity. The idea is to track all user and actions & spot potential discrepancies .
  • 6. Account Lockout If the audit logs show signs of incident, the information security department should be able to immediately disable the compromised user account at a moment's notice to limit the potential damage cause to the organization. This process is is known as Account Lockout.
  • 7. OATH - Open Authentication OAuth is an open- standard authorization protocol or framework that provides applications the ability for “secure designated access.”
  • 8. OATH - Open Authentication For example, When logging into Udemy you can tell Google that it’s OK for Udemy.com to access your profile without having to give Udemy your Google account password. This minimizes risk in a major way: In the event Udemy suffers a breach, your Google account password remains safe.
  • 9. OpenID Connect OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server.