Domain 5 Β· Lesson 5 of 5
Identity Lifecycle (JML) & Directory Services
VΓ²ng Δα»i Danh tΓnh (JML) & Dα»ch vα»₯ ThΖ° mα»₯c
JML β Joiners, Movers, Leavers
| Phase | Event | Security Actions | Timing |
|---|---|---|---|
| Joiner | New employee starts | Background check β NDA β Role assignment β Access provisioning β Security training | Before first day |
| Mover | Role / team change | Remove OLD access FIRST β Add new access β Re-certify β Update manager in system | Day of change |
| Leaver | Termination (any reason) | DISABLE all accounts β Revoke all access β Hardware return β Badge deactivation | IMMEDIATELY on decision |
Critical: Leaver timing
Access must be disabled IMMEDIATELY upon the termination decision β not at end of notice period, not on last working day. This applies equally to voluntary resignations. Disgruntled employees cause the most insider threat incidents during their notice period.
Mover: Remove BEFORE Add
When an employee changes roles, remove their old access BEFORE granting new access. This prevents privilege accumulation during the transition window.
Directory Services
| Service | Purpose | Protocol / Port |
|---|---|---|
| LDAP | Lightweight directory β query and modify directory data | TCP 389 (LDAP), TCP 636 (LDAPS β encrypted) |
| Active Directory | Microsoft directory service β Kerberos-based authentication for Windows domains | Kerberos (TCP/UDP 88), LDAP (TCP 389/636) |
| RADIUS | Centralized AAA for network access β VPN, WiFi, remote access | UDP 1812 (authentication), UDP 1813 (accounting) |
| TACACS+ | Cisco device admin AAA β separates AuthN/AuthZ/Accounting for granular control | TCP 49 β encrypts ENTIRE packet |
RADIUS vs TACACS+ β Critical Differences
RADIUS
- β’ UDP 1812/1813
- β’ Encrypts password only in packet
- β’ Combines AuthN + AuthZ in one exchange
- β’ Best for: network access (VPN, WiFi, 802.1X)
- β’ Less granular authorization control
TACACS+
- β’ TCP 49
- β’ Encrypts ENTIRE packet
- β’ Separates AuthN, AuthZ, and Accounting
- β’ Best for: privileged device admin (Cisco routers/switches)
- β’ More granular β different authz per command
Exam Trap: TACACS+ = more secure for privileged management
RADIUS only encrypts the password β rest of the packet (username, attributes) is sent in cleartext. TACACS+ encrypts everything. For managing privileged devices (routers, switches, firewalls), TACACS+ is the correct choice.
Access Recertification
The process of periodically reviewing and confirming that users still need the access they have. This is a management responsibility β not the security team's job to certify on behalf of managers.
Privileged Access
Quarterly review β admin portals, production system access, break-glass accounts
Standard Access
Annual review β regular application access, shared drives
Process: manager receives list of their team's current access β confirms "still needed" or "revoke" β uncertified access auto-revoked β evidence stored for auditors.
Key Terms
- Leaver = IMMEDIATE disable β not "after notice period." This is the #1 exam trap. Timing of access revocation is the test.
- TACACS+ encrypts entire packet; RADIUS encrypts password only. TACACS+ is more secure for privileged device management.
- TACACS+ = TCP 49; RADIUS = UDP 1812 (auth) / 1813 (accounting). Know these port numbers.
- Access recertification = manager certifies (not security team β manager knows if the person still needs access).
- Mover: REMOVE old access BEFORE granting new access β prevents privilege accumulation during the transition.
Engineer leaving β all steps must complete within 2 hours of termination decision:
- GitHub: Remove from all repos and GitHub org (automate via HR trigger to GitHub Org API)
- Vault: Revoke all policies and tokens within 1 hour (vault token revoke -accessor)
- GCP IAM: Remove all IAM role bindings (gcloud projects remove-iam-policy-binding)
- Kubernetes RBAC: Delete ClusterRoleBinding and RoleBinding for the user
- Datadog: Deactivate user account (audit trail preserved β do not delete)
- Slack: Deactivate (NOT delete β preserve message history for compliance)
- Partner portals: Deactivate in eKYC Vendor, AML Vendor, Bank A admin, Card Processor dashboard (each portal separately)
- Physical: Badge deactivated, laptop returned and wiped
Automation gap: steps 1-6 should be triggered automatically by the HR system on the termination record being created. Manual steps 7-8 should be checklisted in the HR ticket.
Practice Quiz
Q1. An employee resigns with a 2-week notice period. When exactly should their system access be disabled?
βΌ Reveal Answer
Q2. An engineer moves from Platform C team to Platform A team. What should happen to their Platform C access, and in what order relative to Platform A access?
βΌ Reveal Answer
Q3. RADIUS vs TACACS+ β which protocol encrypts the entire packet, and which is preferred for managing Cisco network device access?
βΌ Reveal Answer
Q4. In an access recertification review, who is responsible for certifying that an employee still needs their current access β the manager or the security team?
βΌ Reveal Answer
Q5. LDAP vs LDAPS β what port numbers are used and what does LDAPS add?