Identity Security

Identity & Access Management Labs

Identity Security Laboratory Overview

This section documents hands-on identity security labs focused on access control, authentication hardening, and privilege management in Windows environments.

Work includes implementing identity and access management (IAM) controls such as least-privilege enforcement, credential protection, and secure administrative configuration.

All labs focus on enforcing access control policies and reducing the risk of unauthorized access and privilege escalation.

Lab Distribution Summary

Category Labs
Identity & Access Management 8
Total Identity Security Labs Documented 8

Identity & Access Management (IAM)

This section documents hands-on IAM labs focused on access control configuration, administrative policy enforcement, and identity protection in system environments.

Work demonstrates the implementation of security controls used to restrict access, manage user privileges, and reduce the risk of unauthorized system access.

Identity Protection & Access Control

🔐 Access Control & Identity Protection

SOP – Securing Folder Access with Permissions – v1.0.1

Configuring NTFS permissions to protect sensitive directories and enforce least-privilege access.

Skills: NTFS Permissions · Access Control · Least Privilege

View Report

REPORT – File Ownership Recovery – v1.0.0

Recovering NTFS file ownership and restoring secure permission configurations.

Skills: NTFS Permissions · Access Recovery

View Report

SOP – Password and Account Lockout GPO Hardening – v1.0.1

Implementing password complexity and account lockout policies to reduce brute-force attack risk.

Skills: Password Policy · GPO · Identity Security

View Report

REPORT – Deploy Local GPO for Windows Security Policies – v1.0.0

Configuring Windows security policies to protect credential handling and system access.

Skills: GPO Security · Credential Protection · Policy Enforcement

View Report

REPORT – Applying Local GPO for Session Lock Enforcement – v1.0.0

Enforcing automatic session lock policies to reduce unauthorized access on unattended systems.

Skills: GPO Configuration · Endpoint Security · Access Control

View Report

REPORT – Hardening Windows User Rights via Local Group Policy – v1.0.0

Restricting administrative privileges to enforce least-privilege access.

Skills: Privilege Management · Access Control · GPO

View Report

REPORT – Kerberos Authentication Protocol – v1.0.0

Analyzing Kerberos authentication, including ticket-granting processes and secure identity verification in Active Directory.

Skills: Kerberos · Active Directory · Authentication

View Report

REPORT – Password Managers – v1.0.0

Analyzing password manager technologies and their role in protecting credentials through encrypted storage.

Skills: Credential Management · Encryption · Authentication

View Report


Portfolio Documentation

This section presents identity security work, including access control enforcement, credential protection, and privilege management within Windows environments.

Selected materials demonstrate core IAM capabilities, while additional configuration data and supporting documentation are maintained in a private archive.

Full documentation is available upon request for professional or technical review.