Episode 90 — Access Models and Modern Authentication: JIT Access, Passkeys, Passwordless, and Credential Monitoring (4.5)

This episode covers access control models and modern authentication methods that reduce reliance on standing privileges and reusable passwords. Students should understand rule-based, role-based, time-based, mandatory, discretionary, and just-in-time access models, along with how each controls authorization differently. Just-in-time access grants elevated permissions only when needed and often for a limited period. Passkeys and passwordless authentication reduce password exposure, while password managers help users store stronger credentials and compromised credential monitoring identifies accounts that may need reset or investigation. For Security+ scenarios, students should connect these approaches to least privilege, access reviews, reduced credential reuse, stronger authentication, and faster response to exposed accounts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!
Episode 90 — Access Models and Modern Authentication: JIT Access, Passkeys, Passwordless, and Credential Monitoring (4.5)
Broadcast by