Back to Blog
Research Pillar 1 of 5

IAM Control Plane

Identity as the foundational security layer

Identity and Access Management (IAM) serves as the foundational control plane for modern security architectures. This pillar explores authentication (AuthN), authorization (AuthZ), federation protocols, policy-as-code implementations, and machine identity management across enterprise and critical infrastructure environments. From OAuth/OIDC to SPIFFE/SPIRE, from RBAC to ABAC, we examine how identity becomes the perimeter in a world without traditional boundaries.

Key Topics

Authentication protocols (OAuth 2.0, OIDC, SAML)Authorization models (RBAC, ABAC, ReBAC)Machine identity and workload authenticationPolicy-as-code and OPA/RegoFederation and identity brokeringPrivileged access management (PAM)Identity governance and administration (IGA)
Learning Path
Recommended progression through this pillar
1

IAM Fundamentals

Start with core concepts: subjects, objects, actions, and the authentication/authorization distinction

2

Protocol Deep Dives

Master OAuth 2.0 flows, OIDC claims, and SAML assertions

3

Machine Identity

Explore SPIFFE/SPIRE, workload identity, and service mesh authentication

4

Policy Engineering

Learn policy-as-code with OPA, Cedar, and attribute-based access control

Want to dive deeper?

Subscribe to get notified when new content is published in this pillar, or explore other research domains.