Hook / Why this matters
๐ฏ CISSP Lens
Pick answers that align business risk, governance intent, and practical control execution.
Least privilege and separation of duties sound straightforward, yet many breaches involve someone having more access than they needed. The hard part is turning access control principles into daily processes that actually work.
Core concept explained simply
Identity and access management operations focus on how accounts are created, changed, reviewed, and removed.
Key processes include:
- Provisioning new users with appropriate access
- Adjusting access when roles change
- Removing access promptly when people leave
- Managing privileged accounts carefully
- Periodically reviewing who has access to what
These activities make the difference between a clean access environment and one full of unnecessary risk.
Joiner, mover, leaver lifecycle
The identity lifecycle follows people through their time with an organization.
- Joiner. When someone starts, they need accounts and access quickly, but only to what their role requires.
- Mover. When someone changes roles, existing access should be adjusted, not just layered on.
- Leaver. When someone leaves, accounts must be disabled and access removed promptly.
Security operations should work with HR and IT so that HR events trigger access changes automatically where possible.
Role based access control and least privilege
Role based access control groups permissions into roles that map to job functions. For example, a finance analyst role may have access to certain systems and data, while a marketing specialist role has a different set.
Least privilege means giving users the minimum access needed to perform their job. In practice this requires:
- Defining standard roles for common positions
- Avoiding one off access grants that accumulate over time
- Reviewing access to sensitive systems more frequently
Privileged account management
Privileged accounts, such as domain administrators or cloud subscription owners, represent concentrated risk.
Good privileged access management practices include:
- Using named individual accounts for administration, not shared generic accounts
- Requiring strong authentication such as multifactor methods
- Limiting the number of standing privileged accounts and using just in time elevation where feasible
- Logging and monitoring privileged actions
Security operations teams often own or support the tools that enforce these practices.
Periodic access reviews
Access reviews or recertifications confirm that existing access remains appropriate.
Effective reviews:
- Are focused on high value systems and data
- Ask managers and data owners to confirm or revoke access, not just approve by default
- Produce evidence for auditors and regulators
Poorly designed reviews become checkbox exercises where managers approve everything. Security operations can improve reviews by providing clear guidance and useful reporting.
Integration with HR and IT operations
IAM cannot operate in a vacuum.
Integration points include:
- HR systems providing authoritative information about employment status and role
- Ticketing systems handling access requests and approvals
- Directories and identity providers implementing access decisions
Automating these links reduces manual work and lowers the risk of missed deprovisioning.
CISSP lens
๐ Domain cross-reference
๐ Domain cross-reference
CISSP Domain 7 connects daily IAM operations with policies defined in identity and access control domains.
Exam relevant themes include:
- Operations executes the access policies defined by governance.
- Separation of duties and least privilege require ongoing effort, not a one time setup.
- Periodic access reviews are a control that verifies policy is being followed.
When answering questions, look for options where the security manager strengthens processes and integration, not just adds more technical controls.
Real-world scenario
An employee moves from the finance department to marketing. The move is processed in HR, but no one updates her system access. She keeps finance system permissions along with new marketing access.
Two years later, during an access review, auditors discover that she still has full access to financial reporting systems that she no longer needs. Around the same time, it is discovered that several former employees still have active accounts because termination notices were not linked to IT deprovisioning.
The root problems include:
- Manual, email based provisioning and deprovisioning requests
- No integration between HR events and IAM workflows
- Access reviews treated as a formality, with managers approving lists without scrutiny
The organization responds by:
- Integrating HR and identity systems so that new hires, role changes, and terminations trigger automated workflows.
- Defining roles and access bundles for common positions and departments.
- Tightening the access review process, requiring managers to justify high risk access and providing easy ways to revoke.
Over time, unnecessary access decreases and audit findings improve.
Common mistakes and misconceptions
โ ๏ธ Watch for this mistake: Relying on informal email requests for access provisioning, with no central tracking.
โ ๏ธ Watch for this mistake: Leaving access in place when people change roles, which accumulates unnecessary privileges.
โ ๏ธ Watch for this mistake: Sharing privileged accounts among team members, making accountability impossible.
โ ๏ธ Watch for this mistake: Treating access reviews as simple approvals instead of opportunities to remove excess access.
โ ๏ธ Watch for this mistake: Running IAM as a separate technical project instead of integrating with HR and IT operations.
Actionable checklist
- โ โ Map your current joiner, mover, leaver processes and identify where handoffs between HR, managers, and IT fail.
- โ โ Inventory privileged accounts, including local admin accounts, and move toward named, individual use wherever possible.
- โ โ Define standard roles and access bundles for common job functions and update request forms to use these bundles.
- โ โ Schedule regular access reviews for critical systems and provide managers with clear instructions on what to look for.
- โ โ Integrate HR events with IAM workflows so terminations and role changes automatically trigger reviews and access updates.
- โ โ Establish a policy forbidding shared credentials and back it with monitoring and education.
Key takeaways
- ๐ก ๐ก Identity lifecycle management is a core part of security operations, not just an IT task.
- ๐ก ๐ก Least privilege and separation of duties require continuous operational attention.
- ๐ก ๐ก Privileged accounts carry high risk and demand stronger controls and monitoring.
- ๐ก ๐ก Meaningful access reviews focus on removing unnecessary access, not just confirming the status quo.
- ๐ก ๐ก CISSP Domain 7 expects you to translate access control theory into repeatable, business aligned operations.
Optional exam-style reflection question
๐ Exam practice
๐ Exam practice
Question: During an access review, a manager is asked to confirm access for a former employee who left three months ago but still has active accounts. What is the most important lesson from this finding?
Answer: Deprovisioning processes are failing. Termination events must trigger immediate account disablement, ideally through integration with HR systems. Relying on periodic access reviews alone is not sufficient to remove access for departed employees.