Latest News

Fundamentals of Security, Compliance, and Identity

An educational overview of cloud-era security foundations

Abstract

As organizations migrate workloads into distributed cloud platforms, the perimeter that once protected enterprise data has dissolved. Defending modern systems now depends less on physical boundaries and more on a disciplined combination of Security, Compliance, and Identity (SCI) practices. This paper, written from the perspective of a high-school security enthusiast exploring the field, walks through the foundational ideas a learner or junior practitioner must understand: how risks are shared between providers and customers, how layered controls slow attackers down, why identity has become the new perimeter, and how authentication, authorization, and governance frameworks tie everything together.

  1. Security and Compliance Concepts

Security is the practice of preserving the confidentiality, integrity, and availability (the CIA triad) of information and systems. Compliance is the discipline of demonstrating — usually through evidence, audits, and controls — that an organization meets legal, regulatory, or contractual obligations such as GDPR, HIPAA, PCI-DSS, or ISO 27001. Security is what you do; compliance is how you prove it.

Diagram 1 — Shared Responsibility Across Cloud Service Models

Image Caption: Regardless of model, the customer always owns its data, user accounts, and access policies.

1.1 Defense-in-Depth

Defense-in-depth assumes any single safeguard can fail, so controls are stacked in concentric rings. An attacker who slips past one layer must still defeat the next, buying defenders time to detect and respond.

Diagram 2 — Layered Controls (outer → inner)

1.2 The Zero Trust Model

Zero Trust replaces the outdated “trusted internal network” assumption with a simple rule: never trust, always verify. Every request — inside or outside the corporate network — must be authenticated, authorized, and continuously evaluated against signals such as device health, user risk, and location.

Diagram 3 — Zero Trust Verification Flow

Guiding principles: verify explicitly  •  use least-privilege access  •  assume breach.

1.3 Encryption and Hashing

Encryption transforms readable plaintext into ciphertext using a key. Symmetric encryption (e.g., AES) uses one shared key; asymmetric encryption (e.g., RSA, ECC) uses a public/private key pair. Data is protected at rest, in transit, and increasingly in use through confidential computing. Hashing is one-way: algorithms like SHA-256 produce a fixed-length fingerprint that cannot be reversed, guaranteeing integrity and (with a salt) safe password storage.

1.4 Governance, Risk, and Compliance (GRC)

  • Governance — policies, standards, and accountability for how technology supports business goals.
  • Risk — identify threats, estimate impact and likelihood, then accept, mitigate, transfer, or avoid.
  • Compliance — verifies that governance and risk decisions are enforced and auditable.
  1. Identity Concepts

2.1 What Is Identity?

An identity is a digital representation of a person, device, application, or service that can be uniquely recognized by a system. Each identity carries attributes (name, role, department) and credentials (passwords, certificates, biometrics) used to prove who or what it is.

2.2 Identity as the Primary Security Perimeter

With users working from anywhere and resources hosted across many clouds, the network edge no longer reliably defines “inside” or “outside.” The element that consistently follows users, apps, and devices is their identity — so identity has become the new control plane.

2.3 Authentication vs. Authorization

2.4 Identity Providers (IdPs)

An identity provider is the trusted service that creates, stores, and verifies digital identities and issues security tokens that other applications consume. Examples include Microsoft Entra ID, Okta, Google Identity, and AWS IAM Identity Center. Centralizing identity in an IdP eliminates duplicate accounts and enables single sign-on (SSO).

2.5 Directory Services and Active Directory

A directory service is a hierarchical database of users, groups, devices, and resources, plus the protocols used to query and manage them. Active Directory (AD) is Microsoft’s on-premises directory built on Kerberos and LDAP. Its cloud-native counterpart, Microsoft Entra ID, uses modern protocols (OAuth 2.0, OpenID Connect, SAML) and extends identity management to SaaS and mobile.

2.6 Federation

Federation allows identities from one trusted domain to access resources in another without creating duplicate accounts. A trust relationship is established between identity providers, and tokens (commonly SAML or OIDC) are exchanged — enabling cross-organization SSO.

2.7 Authentication Methods

  • Something you know — passwords, PINs, security questions.
  • Something you have — hardware tokens, smart cards, authenticator apps, FIDO2 keys.
  • Something you are — fingerprints, facial or iris recognition, voice patterns.
  • Somewhere you are / something you do — geolocation or behavioral signals used for risk.

Modern systems increasingly favor passwordless methods (Windows Hello, passkeys, certificate-based sign-in) that combine usability with strong cryptographic proof.

2.8 Multifactor Authentication (MFA)

MFA requires at least two independent factors from different categories above. Even if a password leaks, an attacker still cannot sign in without the second factor. MFA is one of the highest-impact, lowest-cost defenses available and is now baseline hygiene for any internet-facing account.

2.9 Password Protection and Management

  • Length and uniqueness matter more than forced complexity or frequent rotation.
  • Password managers generate and store unique credentials per site.
  • Banned-password lists block common or breached passwords.
  • Smart lockout distinguishes legitimate users from brute-force bots.
  • Self-service password reset (SSPR) with verified factors reduces helpdesk risk.
  • Conditional access can require MFA, block risky sign-ins, or force a reset on leaked creds.

Conclusion

Security, Compliance, and Identity are no longer separate disciplines but a single, interlocking foundation for cloud-era trust. Shared responsibility clarifies who protects what; defense-in-depth and Zero Trust shape how protection is layered and verified; encryption, hashing, and GRC provide the technical and procedural guarantees behind every claim of safety. Above all, identity has become the perimeter — and authentication, authorization, MFA, and modern password (or passwordless) practices are the levers that make that perimeter strong. For a student entering the field today, mastering these fundamentals is the prerequisite to every advanced specialization that follows.

AUTHOR-Shreyansh Vatsa, Security Enthusiast, Acton-Boxborough Regional High School

 

Comments
To Top

Pin It on Pinterest

Share This