A-002 - Identity & Access Management
Purpose
Provide mechanisms to identify users, authenticate access and manage permissions across the Scheol environment.
This capability ensures that only authorized users can access systems and services, and that privileges are appropriately controlled.
Asset Type
- Business Capability
Description
Identity & Access Management (IAM) covers how identities are defined, authenticated and authorized within the lab.
At the current stage, IAM is decentralized and implemented through:
- local system accounts on servers
- SSH key-based authentication
- application-level authentication mechanisms (e.g. Gitea, Dolibarr)
A centralized identity system (AD/LDAP) is planned but not yet deployed.
Criticality
- Critical
IAM directly governs access to all systems and services. Weaknesses can lead to unauthorized access, privilege escalation or loss of control over infrastructure.
Sensitivity
- Highly Sensitive
This asset involves:
- user credentials
- authentication mechanisms
- access control logic
- identity-related data
Exposure Level
- Restricted
IAM components are not directly exposed as a unified system but are present across:
- exposed services (Heaven)
- internal systems (Hell)
Authentication interfaces may be indirectly exposed through applications.
Trust Zone
- Hybrid
IAM spans both:
- Heaven (application authentication, SSH access)
- Hell (internal systems, future directory services)
Dependencies
- Administrative Access mechanisms (SSH)
- Application platforms (Gitea, Dolibarr)
- System-level user management
- Future identity provider (AD/LDAP)
Relationships
- Administrative Access (privileged access control)
- All platform and application assets
- Monitoring and logging systems (authentication visibility)
- Future bastion and directory services
Security Position (Architecture Context)
- Core control layer for access enforcement
- Critical dependency for all security boundaries
- Distributed attack surface due to lack of centralization
Current structural weaknesses:
- absence of centralized identity provider
- inconsistent access control models across systems
- limited visibility on authentication events
Existing Protective Measures
- SSH key-based authentication for system access
- restricted use of privileged accounts
- application-level authentication controls
- basic access hardening practices
Limitations:
- no centralized identity management
- no unified access policy enforcement
- limited correlation of authentication events
Owner / Responsibility
- Security Role (Sec)
Notes
IAM is currently implemented in a decentralized and transitional state.
Planned improvements include:
- deployment of centralized identity services (AD/LDAP)
- improved access control consistency
- stronger authentication monitoring and traceability
This asset is a key dependency for future security architecture maturity.