دانلود کتاب Identity Attack Vectors: Implementing An Effective Identity And Access Management Solution
by Morey J. Haber, Darran Rolls|
|
عنوان فارسی: هویت حمله بردار: اجرای موثر هویت و مدیریت دسترسی راه حل |
دانلود کتاب
جزییات کتاب
• Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector
• Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance
• See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link
• Build upon industry standards to integrate key identity management technologies into a corporate ecosystem
• Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors
Who This Book Is For: Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments.



این کتاب رو مطالعه کردید؟ نظر شما چیست؟