CISSP · · 5 min read

Identity Management Fundamentals: The Foundation of Who Gets Access to What

Identity management is the foundation of access control. Learn the identity lifecycle, proofing, and provisioning practices that keep access accurate and auditable.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Identity Management Fundamentals: The Foundation of Who Gets Access to What

Hook / Why this matters

Every security decision about who can do what starts with identity. If your identity records are wrong, stale, or weakly verified, every downstream control becomes unreliable. Strong identity management turns a messy set of accounts into a trustworthy foundation for access control and auditing.

Core concept explained simply

Identity management is the set of processes and technologies that answer three basic questions:

  1. Who are you really
  2. What accounts represent you in our systems
  3. When should those accounts be created, changed, or removed

At a practical level, identity management covers:

Identity lifecycle

Every digital identity follows a lifecycle:

If any stage fails, you get problems like orphaned accounts, excessive access, or people blocked from doing their job.

Identity proofing and verification

Before you trust an identity, you must verify that the person is who they claim to be. This process is called identity proofing.

Frameworks like NIST SP 800 63 describe identity assurance levels that match proofing strength to risk. Higher risk access requires stronger proofing.

Unique identifiers and avoiding shared accounts

Each person should have a unique identifier that never changes. That might be an employee ID or customer number. Systems use this identifier to tie together all of that person's accounts and access.

Shared accounts, for example a generic admin login used by several people, break this model. If multiple people use the same account, you lose accountability, and forensic investigations become guesswork.

Directory services and identity stores

Identity data needs a central source of truth. Common options include:

These systems store attributes, group memberships, and authentication information, and they answer the basic question, "Who is this user" for many connected applications.

Identity as a Service and federation

Modern environments often use Identity as a Service (IDaaS) platforms that provide cloud based directories, authentication, and single sign on.

Federated identity extends this idea across organizations. Instead of creating local accounts for partners or external users, you trust their home identity provider through standards like SAML or OpenID Connect. The external IdP vouches for the user's identity, and your systems accept that assertion.

Service accounts and non human identities

Not all identities belong to humans. You also have:

These identities often have significant privileges but are easy to overlook. They require the same lifecycle management, proofing, and oversight as user accounts.

CISSP lens

From a CISSP perspective, identity management is foundational to Domain 5 and influences several other domains.

Key points through the exam lens:

On the exam, identity management questions often hide inside scenarios about access control failures, orphaned accounts, or audit findings. Look for root causes in weak lifecycle processes or lack of integration with HR.

Real world scenario

A mid sized company with 1,200 employees used manual email based processes for account changes. HR would email IT when someone joined or left. In practice, HR did not always send termination notices, and IT staff were busy enough that disabling accounts was not a priority.

An internal audit compared the HR employee roster with Active Directory and discovered that 80 former employees still had active accounts, including three former system administrators. One of those accounts was used to log into the VPN months after the employee left. The organization could not prove who used it.

To fix this, the company implemented:

Within one cycle, orphaned accounts dropped from 80 to 3, and follow up investigations identified process gaps with contractors that were then addressed.

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: An internal audit finds that 15 percent of active accounts in the directory do not match any current employee or contractor record. What is the most likely root cause, and what should the security team prioritize first

Answer: The most likely root cause is a failed or weak de provisioning process that is not reliably triggered by HR termination events. The security team should first disable or review the orphaned accounts, then work with HR and IT to integrate identity management with HR systems so that terminations immediately disable accounts. They should also establish periodic reconciliations to detect future gaps.

Read next

© 2025 Threat On The Wire. All rights reserved.