Pillar A: CybersecurityA6

Identity & Access Management

AuthN/AuthZ, SSO, MFA, PAM, RBAC/ABAC, identity governance, FIDO2/passkeys, plus non-human identity: service accounts, workload identity, agent / plugin identities.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Identity & Access Management.

What is Identity & Access Management?

Identity and Access Management (IAM) is the security discipline focused on ensuring the right people and systems have the right access to the right resources at the right time. In a world where the network perimeter has dissolved, identity has become the new security perimeter — the single most critical control plane for preventing unauthorized access to systems, data, and applications.

Modern IAM encompasses authentication (proving who you are), authorization (determining what you can do), and accountability (logging what you did). Multi-Factor Authentication (MFA) has evolved from SMS-based codes to phishing-resistant standards like FIDO2/WebAuthn and passkeys. Privileged Access Management (PAM) protects the most dangerous accounts — domain admins, root users, and service accounts — with session recording, just-in-time access, and credential vaulting. Single Sign-On (SSO) using SAML and OpenID Connect reduces credential sprawl while improving user experience.

Authorization models have progressed from simple Role-Based Access Control (RBAC) to Attribute-Based Access Control (ABAC) and Policy-Based Access Control (PBAC), enabling fine-grained, context-aware access decisions. Identity governance ensures access rights are reviewed regularly, orphaned accounts are deprovisioned, and separation of duties is enforced. As organizations adopt cloud and hybrid architectures, federated identity and cross-domain trust become critical architectural challenges.

Why it matters

Identity is the most exploited attack vector. Over 80% of breaches involve compromised credentials. Getting IAM right — strong authentication, least privilege, and continuous access governance — prevents more breaches than any other single control.

IAM is the foundational control plane for Zero Trust, cloud security, and application security. Every access decision in every system ultimately depends on identity. Without strong IAM, no other security control can be fully effective.

Decide who or what can do what, enforce it cryptographically, constrain AI behaviour.

Other domains in this layer

See how this layer connects to the rest of the domain map →

Standards and frameworks

Curated resources

Authoritative sources we ground Identity & Access Management questions in — frameworks, research, guides, and tools.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

AWS Security SpecialtyProfessional·Amazon Web ServicesOfficial page →

AWS Certified Security — Specialty (SCS-C02)

Deep AWS security: IAM, data protection, detection, incident response within AWS primitives.

AZ-104Associate·MicrosoftOfficial page →

Microsoft Azure Administrator Associate

Microsoft Azure Administrator Associate

AZ-500Associate·MicrosoftOfficial page →

Microsoft Certified: Azure Security Engineer Associate

Azure-native security engineering: Entra ID, network controls, Defender, Sentinel.

CAMSProfessional·ACAMSOfficial page →

IMI Certfied Access Management Specialist

IMI Certfied Access Management Specialist

CCNP SecProfessional·CiscoOfficial page →

Cisco Certified Network Professional - Security

Cisco Certified Network Professional - Security

CCSPProfessional·ISC2Official page →

Certified Cloud Security Professional

Cloud security architecture: shared responsibility, identity, data protection, crypto, and cloud-native detection.

CDPSEProfessional·ISACAOfficial page →

Certified Data Privacy Solutions Engineer

ISACA certification for Privacy Engineering. Focus on technical implementation of privacy requirements: Privacy Governance, Privacy Architecture, and Data Lifecycle Management. Bridge between privacy and technology.

CIAMProfessional·Identity Management InstituteOfficial page →

Identify Management Institute Certified Identify and Access Manager

Identify Management Institute Certified Identify and Access Manager

CIDPROProfessional·IDProOfficial page →

IDPro Certified Identity Professional

IDPro Certified Identity Professional

CIGEExpert·Identity Management InstituteOfficial page →

IMI Certified Identity Governance Expert

IMI Certified Identity Governance Expert

CIMPProfessional·DRI InternationalOfficial page →

Identify Management Institute Certified Identity Management Professional

Identify Management Institute Certified Identity Management Professional

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

CISSP-ISSAPExpert·ISC2Official page →

CISSP Information Systems Security Architecture Professional

Architecture concentration on top of CISSP — trust boundaries, identity / crypto / network composition, defense-in-depth design.

CISTProfessional·TigerschemeOfficial page →

IMI Certfied Identity and Security Technologist

IMI Certified Identity and Security Technologist

CRTEExpert·Altered SecurityOfficial page →

Certified Red Team Expert

Multi-forest AD compromise — cross-trust abuse, advanced delegation, and persistence in hardened enterprise environments.

CRTOProfessional·Zero-Point SecurityOfficial page →

Zero Point Security Certified Red Team Operator

The CRTO from Zero-Point Security has established itself as one of the most practice-oriented red team certifications on the market. The associated course 'Red Team Ops' focuses on Cobalt Strike, Active Directory attacks, and realistic adversary simulation with OPSEC considerations. The exam format is purely practical and evaluates not only objective achievement but also operational behavior – points are deducted for triggered detections. Particularly attractive is the price-performance ratio compared to SANS certifications, as the course and exam are significantly more affordable. For experienced pentesters looking to develop towards red teaming and C2 deployment, the CRTO is a highly relevant qualification.

CRTPProfessional·Altered SecurityOfficial page →

Certified Red Team Professional

Hands-on Active Directory attacker — Kerberos abuse, trust attacks, and lateral movement against a real multi-domain forest.

CSA CZTProfessional·Cloud Security AllianceOfficial page →

Certified Zero Trust (CCZT)

Vendor-neutral Zero Trust architecture and governance — NIST SP 800-207, ZTA pillars, and program implementation.

CyberArk DefenderAssociate·CyberArkOfficial page →

CyberArk Defender — PAM (CDE-PAM)

Day-to-day administration of CyberArk PAM — the dominant enterprise privileged-access platform.

CyberArk GuardianExpert·CyberArkOfficial page →

CyberArk Guardian — PAM

Top-tier CyberArk practitioner — leads complex PAM programs and contributes back to the community.

CyberArk SentryProfessional·CyberArkOfficial page →

CyberArk Sentry — PAM

Designs and deploys CyberArk PAM at enterprise scale — vault architecture, HA/DR, and complex onboarding.

F5 CTS APMProfessional·F5Official page →

F5 Big-IP Certified Technical Specialist - Access Policy Manager

F5 Big-IP Certified Technical Specialist - Access Policy Manager

FCSS PCSProfessional·FortinetOfficial page →

Fortinet Certified Solution Specialist - Public Cloud Security

Fortinet Certified Solution Specialist - Public Cloud Security

GCP Professional Cloud Security EngineerProfessional·Google CloudOfficial page →

Google Cloud Certified — Professional Cloud Security Engineer

GCP-specific security engineering: identity, VPC SC, secrets, logging, compliance.

GCWNProfessional·GIACOfficial page →

GIAC Certified Windows Security Administrator

GIAC Certified Windows Security Administrator

GSECAssociate·GIAC / SANSOfficial page →

GIAC Security Essentials

Broad defender fundamentals. Often paired with SANS SEC401.

HTB CPTSProfessional·Hack The BoxOfficial page →

Hack the Box Certified Penetration Testing Specialist

Hack the Box Certified Penetration Testing Specialist

ISSAPExpert·ISC2Official page →

Information Systems Security Architecture Professional

ISC2 specialization for security architecture. Requires an active CISSP. Focus on GRC, Security Architecture Modeling, Infrastructure Security, and IAM architecture. For senior security architects in enterprise environments.

MS-100Expert·MicrosoftOfficial page →

Microsoft 365 Certified Enterprise Administrator Expert

Microsoft 365 Certified Enterprise Administrator Expert

Okta Certified ProfessionalAssociate·OktaOfficial page →

Okta-specific identity deployment (SSO, MFA, lifecycle).

OSCPProfessional·OffSecOfficial page →

Offensive Security Certified Professional

Hands-on penetration testing — exploitation, privilege escalation, AD attacks.

OSEPProfessional·OffSecOfficial page →

Offensive Security Experienced Penetration Tester

The OffSec Experienced Penetration Tester (OSEP) is based on the PEN-300 course and addresses advanced techniques around antivirus evasion, Active Directory attacks, and living-off-the-land methods. The fully practical 48-hour exam (47:45 hrs exam + 24 hrs report) in a simulated enterprise environment is the key difference from knowledge-based certifications—it tests real attack capabilities. OSEP is considered credible proof of high-level offensive competence in red team circles, but requires solid OSCP knowledge. Together with OSED and OSWE, OSEP forms the OSCE³ trio.

PCNSEProfessional·Palo AltoOfficial page →

Palo Alto Networks Certified Network Security Engineer

Palo Alto Networks Certified Network Security Engineer

PNPTProfessional·TCM SecurityOfficial page →

Practical Network Penetration Tester

Hands-on network + AD pentesting with OSINT + reporting.

SailPoint Identity EngineerProfessional·SailPointOfficial page →

SailPoint Certified Identity Security Engineer

Designs and engineers SailPoint identity solutions across IdentityIQ and Identity Security Cloud (ISC).

SailPoint IdentityIQ AdminProfessional·SailPointOfficial page →

Identity governance and administration (IGA) at enterprise scale.

SC-300Associate·MicrosoftOfficial page →

Microsoft Certified: Identity and Access Administrator Associate

Entra ID deployment, conditional access, privileged access, identity governance.

SC-400Associate·MicrosoftOfficial page →

Microsoft Certified Information Protection Administrator Associate

Microsoft Certified Information Protection Administrator Associate

SC-900Associate·MicrosoftOfficial page →

Microsoft Certified: Security, Compliance, and Identity Fundamentals

Microsoft Certified: Security, Compliance, and Identity Fundamentals

Security+Entry·CompTIAOfficial page →

CompTIA Security+

Broad entry-level knowledge across threats, ops, IAM, network, and crypto basics.

SF CIAMDProfessional·UnbekanntOfficial page →

SalesForce Certified Identity and Access Management Designer

SalesForce Certified Identity and Access Management Designer

SSCPProfessional·ISC2Official page →

(ISC)2 Systems Security Certified Practitioner

The SSCP is ISC2's entry-level certification below the CISSP and targets technically active security professionals with initial work experience. Since October 2025, the exam uses Computerized Adaptive Testing (CAT), which customizes the exam experience individually and increases integrity. The SSCP covers seven technical domains, from access control through cryptography to network security, and positions itself as practical proof of operational security competence. It is less well-known than Security+ or GSEC, but benefits from ISC2's strong brand and serves well as an intermediate step toward the CISSP. The effort for annual certification maintenance (AMF + CPEs) is moderate.

Also touched

GPENProfessional·GIAC / SANSOfficial page →

GIAC Penetration Tester

Penetration testing methodology + documentation.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

Education and certifications

More in Cybersecurity

Test what you know about Identity & Access Management

44 questions available. Beginner to expert questions, scored against the global leaderboard.