This curriculum spans the design and operationalization of access controls across identity, network, and application layers, comparable to a multi-phase security transformation program addressing both internal governance and third-party risk in regulated environments.
Module 1: Threat Modeling and Risk Assessment
- Decide whether to adopt STRIDE or PASTA frameworks based on organizational structure and development lifecycle maturity.
- Conduct asset inventory to identify systems containing sensitive data that require elevated access controls.
- Map attack vectors for high-value assets, including legacy systems without native logging capabilities.
- Assign risk scores using quantitative vs. qualitative methods based on availability of historical incident data.
- Integrate threat intelligence feeds to update models with emerging TTPs from active threat actors.
- Validate model assumptions through red team simulations and adjust control priorities accordingly.
Module 2: Identity and Access Management (IAM) Architecture
- Design role hierarchies in role-based access control (RBAC) to minimize privilege creep in large organizations.
- Implement just-in-time (JIT) access for privileged accounts using identity governance tools like SailPoint or Saviynt.
- Enforce separation of duties (SoD) policies in ERP systems to prevent single-user privilege accumulation.
- Integrate on-premises Active Directory with cloud identity providers using hybrid federation patterns.
- Define lifecycle management workflows for access provisioning and deprovisioning across joined systems.
- Configure adaptive authentication policies based on risk signals such as location, device, and behavior.
Module 3: Privileged Access Management (PAM)
- Select between on-premises and cloud-hosted PAM solutions based on regulatory requirements and network topology.
- Enforce session recording and keystroke logging for administrative access to critical infrastructure.
- Rotate privileged credentials automatically using vault-integrated scripts and scheduled jobs.
- Implement time-bound access approvals with multi-person authorization (break-glass procedures).
- Isolate privileged users into dedicated workstations with restricted internet access.
- Integrate PAM systems with SIEM for real-time alerting on anomalous privileged behavior.
Module 4: Network Segmentation and Access Control
- Define zone and conduit models to segment networks based on data sensitivity and system function.
- Deploy micro-segmentation in virtualized environments using host-based firewalls or SDN policies.
- Configure firewall rules to enforce least privilege, logging and reviewing rule changes monthly.
- Implement VLAN access control lists (VACLs) to restrict lateral movement between subnets.
- Use network detection and response (NDR) tools to identify unauthorized east-west traffic.
- Test segmentation effectiveness through controlled penetration testing and traceroute analysis.
Module 5: Monitoring, Detection, and Logging
- Standardize log formats and retention policies across hybrid environments to meet compliance mandates.
- Deploy endpoint detection and response (EDR) agents to capture process execution and file changes.
- Configure correlation rules in SIEM to detect brute force attacks, failed logins, and access from unusual geolocations.
- Establish thresholds for anomaly detection to reduce false positives in user behavior analytics (UBA).
- Integrate cloud trail logs from AWS, Azure, or GCP into centralized logging infrastructure.
- Validate log integrity using cryptographic hashing and write-once storage solutions.
Module 6: Incident Response and Forensics
- Preserve disk and memory images from compromised systems using write blockers and forensic tools.
- Isolate affected systems without alerting attackers by manipulating network ACLs instead of powering down.
- Conduct timeline analysis to reconstruct unauthorized access sequences from multiple log sources.
- Determine scope of data exposure by correlating access logs with data classification labels.
- Coordinate disclosure decisions with legal and compliance teams based on breach notification laws.
- Update detection rules and block indicators of compromise (IOCs) across security tools post-incident.
Module 7: Governance, Audit, and Compliance
- Perform quarterly access reviews for privileged and sensitive roles using automated attestation workflows.
- Respond to internal and external audit findings by remediating access control gaps within defined SLAs.
- Document access control policies to align with standards such as ISO 27001, NIST 800-53, or SOC 2.
- Balance operational efficiency with security by adjusting approval workflows for urgent access requests.
- Enforce data handling policies through DLP systems that monitor unauthorized transfers via email or USB.
- Measure control effectiveness using KPIs such as mean time to detect (MTTD) and time to revoke access.
Module 8: Secure Development and Third-Party Risk
- Enforce secure coding practices by integrating SAST and DAST tools into CI/CD pipelines.
- Review third-party application access to internal systems and apply least privilege via API gateways.
- Conduct security assessments of vendor IAM integrations before production deployment.
- Limit service account permissions and rotate associated secrets on a defined schedule.
- Monitor for hardcoded credentials in source code repositories using automated scanning tools.
- Require contractual clauses mandating breach notification and access audit log sharing with partners.