Identity & Access Management (IAM)
Who gets in, what they can touch, and for how long — enforced by identity, authentication, authorization, and least privilege.
Overview
IAM is the foundation of every cloud environment. It defines how identities are created, authenticated, authorized, and governed across applications and infrastructure.
Strong IAM ensures users have the right access at the right time, while poor IAM practices often lead to privilege escalation, unauthorized access, or full compromise.
This page documents the IAM labs I’ve completed and the advanced identity engineering skills I’m building toward.
Completed Labs
Identity Lifecycle & RBAC in Entra ID
Introduction to AWS IAM
Configuring a RADIUS Server
Linux Account Management
In Progress Labs
Hybrid Identity — Entra Connect Sync
Multi-Factor Authentication & Conditional Access
Passwordless + Self-Service Password Reset
Advanced IAM Labs
Higher-level identity engineering projects I will build as I progress through AWS, Zero Trust, and cloud security architecture.