دانلود کتاب Identity Attack Vectors: Implementing An Effective Identity And Access Management Solution
by Morey J. Haber, Darran Rolls
|
عنوان فارسی: هویت حمله بردار: اجرای موثر هویت و مدیریت دسترسی راه حل |
دانلود کتاب
جزییات کتاب
• Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector
• Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance
• See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link
• Build upon industry standards to integrate key identity management technologies into a corporate ecosystem
• Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors
Who This Book Is For: Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments.