<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Shiphrah</title>
    <description>The latest articles on Forem by Shiphrah (@identity-with-shiph).</description>
    <link>https://forem.com/identity-with-shiph</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3744934%2Fac41729c-82ff-4c50-9d36-5e0c3c7a8bc1.png</url>
      <title>Forem: Shiphrah</title>
      <link>https://forem.com/identity-with-shiph</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/identity-with-shiph"/>
    <language>en</language>
    <item>
      <title>The First Password Breach Wasn’t a Hacker — It Was OperationsQuestion for IAM/PAM folks:</title>
      <dc:creator>Shiphrah</dc:creator>
      <pubDate>Mon, 16 Feb 2026 22:41:11 +0000</pubDate>
      <link>https://forem.com/identity-with-shiph/the-first-password-breach-wasnt-a-hacker-it-was-operationsquestion-for-iampam-folks-4ch4</link>
      <guid>https://forem.com/identity-with-shiph/the-first-password-breach-wasnt-a-hacker-it-was-operationsquestion-for-iampam-folks-4ch4</guid>
      <description>&lt;p&gt;One of the earliest “password breaches” stories in computing wasn’t caused by a genius attacker.&lt;/p&gt;

&lt;p&gt;It happened because the password file got exposed during normal operations—think debugging, printing logs, moving files around. Not malware. Not zero-days. Just everyday workflow colliding with sensitive data.&lt;/p&gt;

&lt;p&gt;Even if you’ve heard different versions of the story, the lesson is the same:&lt;/p&gt;

&lt;p&gt;Credential failures often look like routine work.&lt;/p&gt;

&lt;p&gt;The “printer moment” still exists today&lt;/p&gt;

&lt;p&gt;We’ve upgraded from printed password lists to:&lt;/p&gt;

&lt;p&gt;secrets pasted into tickets “just for today”&lt;/p&gt;

&lt;p&gt;admin creds sitting in scripts “until the release”&lt;/p&gt;

&lt;p&gt;shared accounts because “everyone needs access”&lt;/p&gt;

&lt;p&gt;over-permissioned groups that are “temporary” for months&lt;/p&gt;

&lt;p&gt;vendor access that never expires&lt;/p&gt;

&lt;p&gt;None of these are rare. They’re what happens when convenience becomes policy.&lt;/p&gt;

&lt;p&gt;Why IAM/PAM exists?&lt;/p&gt;

&lt;p&gt;IAM gives structure. PAM adds discipline to privilege.&lt;/p&gt;

&lt;p&gt;PAM done well is not just a product—it’s a system that enforces:&lt;/p&gt;

&lt;p&gt;Ownership: who is accountable for this identity?&lt;/p&gt;

&lt;p&gt;Time limits (JIT): why is this permanent?&lt;/p&gt;

&lt;p&gt;Verification: can we prove who did what?&lt;/p&gt;

&lt;p&gt;Evidence: can we defend it in an audit and an incident?&lt;/p&gt;

&lt;p&gt;If your controls don’t produce evidence, they don’t exist when it matters.&lt;/p&gt;

&lt;p&gt;A tiny checklist that prevents “printer moments”&lt;/p&gt;

&lt;p&gt;When someone requests access, ask:&lt;/p&gt;

&lt;p&gt;Does this map to a role/group, or is it a one-off?&lt;/p&gt;

&lt;p&gt;Does it need privilege, or standard access?&lt;/p&gt;

&lt;p&gt;Does it need to be permanent, or time-bound?&lt;/p&gt;

&lt;p&gt;What’s the review cadence?&lt;/p&gt;

&lt;p&gt;Where’s the evidence (ticket/approval/export/log/screenshot)?&lt;/p&gt;

&lt;p&gt;That’s the difference between “we think we’re secure” and “we can prove it.”&lt;/p&gt;

</description>
      <category>iam</category>
      <category>cybersecurity</category>
      <category>hacker</category>
      <category>identity</category>
    </item>
    <item>
      <title>From “User Creation” to Real IAM: Building RBAC in Active Directory</title>
      <dc:creator>Shiphrah</dc:creator>
      <pubDate>Mon, 16 Feb 2026 17:01:56 +0000</pubDate>
      <link>https://forem.com/identity-with-shiph/from-user-creation-to-real-iam-building-rbac-in-active-directory-1i2m</link>
      <guid>https://forem.com/identity-with-shiph/from-user-creation-to-real-iam-building-rbac-in-active-directory-1i2m</guid>
      <description>&lt;p&gt;Identity &amp;amp; Access Management clicked for me when I stopped thinking about “creating users” and started thinking about governance.&lt;/p&gt;

&lt;p&gt;Last week I built a hands-on Active Directory lab to model how enterprise identity environments actually work. The focus wasn’t just setting up a domain — it was implementing role-based access control (RBAC) the way real organizations do it: through structure, groups, and inheritance.&lt;/p&gt;

&lt;p&gt;1) Identity Structure: Organizational Units (OUs)&lt;/p&gt;

&lt;p&gt;I created departmental OUs (HR, IT, Service Accounts, Users) to model how businesses segment identities. This structure supports delegation, policy consistency, and clean administration boundaries.&lt;/p&gt;

&lt;p&gt;2) Provisioning Identities&lt;/p&gt;

&lt;p&gt;I provisioned demo identities (ex: HR users) inside the appropriate OU. The key lesson here: identity organization isn’t cosmetic — it’s foundational to scalable governance.&lt;/p&gt;

&lt;p&gt;3) RBAC Assignment: Security Groups&lt;/p&gt;

&lt;p&gt;Instead of assigning permissions directly to users, I created security groups aligned to roles (ex: HR_Group). In enterprise IAM, groups are the control plane — they make access scalable and auditable.&lt;/p&gt;

&lt;p&gt;4) RBAC Enforcement: Access Inheritance&lt;/p&gt;

&lt;p&gt;Finally, I verified the user’s “Member Of” relationships to prove the access model is enforced through group membership. This is what makes RBAC reliable and easy to audit.&lt;/p&gt;

&lt;p&gt;This lab reinforced the “why” behind IAM tooling: building access systems that enforce least privilege, reduce operational overhead, and stay clean under audit.&lt;/p&gt;

&lt;p&gt;Next I plan to extend this lab into Microsoft Entra ID to demonstrate cloud identity security controls like Conditional Access, access reviews, and privileged access management.&lt;/p&gt;

</description>
      <category>iam</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Building an Enterprise IAM Lab: Active Directory, Entra ID, RBAC &amp; Access Governance</title>
      <dc:creator>Shiphrah</dc:creator>
      <pubDate>Wed, 11 Feb 2026 03:59:19 +0000</pubDate>
      <link>https://forem.com/identity-with-shiph/building-an-enterprise-iam-lab-active-directory-entra-id-rbac-access-governance-3oof</link>
      <guid>https://forem.com/identity-with-shiph/building-an-enterprise-iam-lab-active-directory-entra-id-rbac-access-governance-3oof</guid>
      <description>&lt;h1&gt;
  
  
  Building an Enterprise IAM Lab: Active Directory, Entra ID, RBAC &amp;amp; Access Governance
&lt;/h1&gt;

&lt;p&gt;Most Identity &amp;amp; Access Management (IAM) skills are taught in theory — but real-world identity flows, access governance, and privileged access management require hands-on experience.&lt;/p&gt;

&lt;p&gt;To bridge this gap, I built a full &lt;strong&gt;enterprise-style IAM lab&lt;/strong&gt; simulating how organizations manage identities, enforce least privilege, and protect privileged accounts across the lifecycle.&lt;/p&gt;

&lt;p&gt;Instead of just reading about IAM, I designed and configured everything myself.&lt;/p&gt;

&lt;h1&gt;
  
  
  Goal
&lt;/h1&gt;

&lt;p&gt;Recreate a realistic enterprise IAM environment to demonstrate responsibilities of an IAM Analyst, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identity provisioning &amp;amp; lifecycle automation (Joiner–Mover–Leaver workflows)
&lt;/li&gt;
&lt;li&gt;Role-Based Access Control (RBAC) and group-based access management
&lt;/li&gt;
&lt;li&gt;Conditional Access policies and Multi-Factor Authentication (MFA)
&lt;/li&gt;
&lt;li&gt;Access reviews, audit logging, and governance checks
&lt;/li&gt;
&lt;li&gt;Privileged access management (PAM/PIM)
&lt;/li&gt;
&lt;li&gt;Audit-ready compliance workflows (SOC 2, ISO 27001 concepts)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The goal was to understand not just how to create users — but how &lt;strong&gt;identity flows through a system&lt;/strong&gt;, and how proper governance reduces organizational risk.&lt;/p&gt;

&lt;h1&gt;
  
  
  Architecture Overview
&lt;/h1&gt;

&lt;p&gt;GitHub link: &lt;a href="https://github.com/Shiphrah-identity/enterprise-iam-lab/tree/main" rel="noopener noreferrer"&gt;https://github.com/Shiphrah-identity/enterprise-iam-lab/tree/main&lt;/a&gt;&lt;/p&gt;

</description>
      <category>iam</category>
      <category>cybersecurity</category>
      <category>azure</category>
    </item>
  </channel>
</rss>
