IAAA Model

Overview

The IAAA model consists of four essential pillars—Identification, Authentication, Authorization, and Accountability—that work together to protect sensitive information and resources in an organization. Identification establishes who a user claims to be through unique identifiers like usernames or email addresses, while Authentication verifies that claim through methods such as passwords or verification codes. Authorization then determines what resources and operations the authenticated user is permitted to access based on their role and privileges. Together, these three elements form a security foundation that is reinforced by Accountability, which logs and tracks all user activity for incident investigation and responsibility enforcement.


Key Information


Task

  1. You are granted access to read and send an email. What is the name of this process?
    1. Authorisation
  2. Which process would require you to enter your username?
    1. Identification
  3. Although you have write access, you should only make changes if necessary for the task. Which process is required to enforce this policy?
    1. Accountability

Conclusion

The IAAA model provides a comprehensive security framework that addresses both access control and audit requirements essential for modern cybersecurity. By systematically implementing identification, authentication, authorization, and accountability mechanisms, organizations can significantly reduce vulnerability to internal and external security threats. Understanding each component's distinct role is fundamental for 4th-year cybersecurity students designing secure systems and developing security policies.


Resources



Revision #1
Created 2025-11-29 01:28:57 UTC by David Rizzo
Updated 2025-11-29 01:35:54 UTC by David Rizzo