Modern Web Architecture and Security This was a new term for me as I started putting together my most recent study guide. SPA, which stands for Single-Page Application. While it sounds like a simple website, an SPA represents a fundamental shift in how web applications function, bringing unique challenges to the world of information security. Read More …
Tag: Identity Management
OIDC – OpenID Connect
Adding Identity to the Authorization Layer In the journey through information security, you will frequently encounter OAuth 2.0. While OAuth is excellent at authorization, it was never actually designed for authentication. To solve this, OIDC, or OpenID Connect, was created. Think of it this way: OAuth 2.0 is the key to a hotel room, while OIDC Read More …
PKCE – Proof Key for Code Exchange
Securing OAuth 2.0 for the Modern Web In the world of Information Security, acronyms often act as gatekeepers to critical concepts. One of the most vital for modern identity management is PKCE (pronounced “pixie”), which stands for Proof Key for Code Exchange. If you are new to the field, you likely know that OAuth 2.0 Read More …
Beginner’s Guide to the Active Directory Tier Model
The Lateral Movement Highway If you read one of the latest States of Cybercrime report by Microsoft, one finding stands out above the rest: the leading factor in ransomware incidents is “insufficient privilege access and lateral movement controls.” Just so we are all on page 12 with each other, I am saying that Lateral Movement Read More …
SAML – Security Assertion Markup Language
In today’s digital landscape, where online security is paramount, understanding the tools that help protect our identities is essential. One such tool is SAML, which stands for Security Assertion Markup Language. While the acronym may sound complex, SAML plays a crucial role in enhancing identity security, especially in environments where multiple applications and services are Read More …
Notes :: The Red Forest model
The Red Forest model, also known as the Enhanced Security Administrative Environment (ESAE), was a security design for Active Directory (AD). Think of AD as the central phone book and security guard for a company’s computer network. It keeps track of all users, computers, and their permissions. The Red Forest model was created to make Read More …
RBAC – Role-Based Access Control
Technical Description of Role-Based Access Control (RBAC) Role-Based Access Control (RBAC) is a non-discretionary access control model that manages resource access based on predefined roles assigned to users. Unlike Discretionary Access Control (DAC), where resource owners dictate access, or Mandatory Access Control (MAC), where a central authority assigns security labels, RBAC operates on the principle Read More …
ACL – Access Control List
Think of an Access Control List (ACL) as a detailed gatekeeper attached to a digital resource, like a file, folder, network port, or even a database object. This gatekeeper holds a specific list of who (users or groups) is allowed to interact with that resource and in what way (what permissions they have). Instead of Read More …
MAC – Mandatory Access Control
A Rigid Security Model Mandatory Access Control (MAC) is a security model where access to resources is determined by a central authority based on security labels assigned to both subjects (users, processes) and objects (files, resources). Unlike discretionary access control (DAC), where the owner of a resource can control who accesses it, and role-based access Read More …
ENIAD – Endpoint, Network, Identity, Application, Data
Overview of ENIAD The ENIAD framework provides a comprehensive approach to cybersecurity by focusing on five critical areas that organizations must protect to ensure a robust security posture. Each component addresses specific aspects of security, enabling organizations to detect, respond to, and mitigate threats effectively. 1. Endpoint Endpoints refer to devices that connect to the Read More …