Identity & Access Basics

Two key words
- Authentication: proving who you are (login)
- Authorization: what you are allowed to do (permissions)
Least privilege
People should have only the access they need to do their job.
Why this matters:
- Reduces damage from mistakes
- Reduces damage from stolen accounts
Passwords: the reality
- People reuse passwords
- Phishing steals passwords
- Password managers help a lot
MFA: the practical benefit
MFA makes stolen passwords less useful. It does not automatically stop all phishing.
Activity (10 minutes)
Choose a setting (school, small business, lab).
List 4 roles and the minimum access each needs:
- Role 1:
- Role 2:
- Role 3:
- Role 4:
Identify one common access that is too broad:
- Over-granted access:
- Safer alternative: