CISSP · · 4 min read

CISSP Domain 5 Exam Scenario Deep Dive: Think Like an IAM Strategist

Domain 5 is about IAM strategy, not configuration. Learn how to approach scenario questions about models, factors, SSO, and governance with a CISSP level mindset.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

CISSP Domain 5 Exam Scenario Deep Dive: Think Like an IAM Strategist

Hook / Why this matters

Domain 5 questions rarely ask you to recall definitions in isolation. Instead, they test how you apply identity and access management concepts to messy, real world scenarios. To score well, you must think like a strategist who balances security, usability, cost, and governance.

Core concept explained simply

CISSP Domain 5 covers identity and access management, but the exam focuses more on decision making than configuration.

Key patterns in questions include:

Recognizing the question type

Before you jump to answers, classify the question:

This lens helps you eliminate distractors that address the wrong part of the problem.

Access control model scenarios

You will see scenarios that implicitly point to DAC, MAC, RBAC, or ABAC. Clues include:

The right answer usually matches both security requirements and operational realities.

Authentication factor questions

Questions often test whether you can:

Remember that two knowledge factors do not equal multi factor authentication.

Governance and process decisions

Many IAM problems are really governance problems:

The best answers focus on process improvements, not just technical fixes.

CISSP lens

The CISSP exam rewards thinking like a security leader.

Key mindset points:

When in doubt between two technically correct answers, choose the one that is more strategic, holistic, and aligned with risk management.

Real world scenario

Consider four example scenarios similar to exam questions.

Scenario 1: Picking an access control model

A government agency handles documents with multiple classification levels. Users must not be able to share classified documents with unauthorized parties, even if they own the files.

Strategic answer: Recommend Mandatory Access Control, with classification labels and clearances enforced by the system.

Scenario 2: Understanding authentication factors

A company wants to implement two factor authentication for remote access. They propose a password plus security questions.

Both are knowledge factors, so this is not true multi factor authentication.

Strategic answer: Recommend password plus a possession or inherence factor, such as a hardware token or biometric check.

Scenario 3: Evaluating an SSO design

An organization implements SAML based SSO for several cloud apps. Sessions last for eight hours with no idle timeout and no step up authentication for administrative actions.

The root issue is weak session management and lack of re authentication for high risk actions.

Strategic answer: Shorten session durations, add idle timeouts, and require step up MFA for administrative or high value operations.

Scenario 4: Designing access reviews

A growing company runs annual access reviews with giant spreadsheets. Managers approve almost everything without analysis.

The process is ineffective. The fix is governance improvement.

Strategic answer: Move to more frequent, scoped, risk based reviews with better context, and use an IGA tool to streamline the process.

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: A company wants partners to access specific applications without creating accounts in the internal directory. Which IAM approach best fits this requirement, and what is the main benefit

Answer: Federated identity using SAML or OpenID Connect fits best. The company establishes trust with the partner's identity provider, so partner employees authenticate with their own credentials and receive assertions granting access. This avoids managing external user accounts while maintaining control through the federation trust.

Read next

© 2025 Threat On The Wire. All rights reserved.