IAM Control Plane
Identity as the foundational security layer
Identity and Access Management (IAM) serves as the foundational control plane for modern security architectures. This pillar explores authentication (AuthN), authorization (AuthZ), federation protocols, policy-as-code implementations, and machine identity management across enterprise and critical infrastructure environments. From OAuth/OIDC to SPIFFE/SPIRE, from RBAC to ABAC, we examine how identity becomes the perimeter in a world without traditional boundaries.
Key Topics
Posts in This Pillar
3 articlesIAM Fundamentals
Start with core concepts: subjects, objects, actions, and the authentication/authorization distinction
Protocol Deep Dives
Master OAuth 2.0 flows, OIDC claims, and SAML assertions
Machine Identity
Explore SPIFFE/SPIRE, workload identity, and service mesh authentication
Policy Engineering
Learn policy-as-code with OPA, Cedar, and attribute-based access control
Want to dive deeper?
Subscribe to get notified when new content is published in this pillar, or explore other research domains.

