Identity and Access Management cover art

Identity and Access Management

Recommended Best Practices for Administrators

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Identity and Access Management

By: Cybersecurity and Infrastructure Security Agency
Narrated by: Tom Brooks
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £11.99

Buy Now for £11.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials. Beyond the physical users, service and system accounts are also in scope for IAM and critical for IAM administrators to manage within their organizations. Inventorying, auditing, and tracking all of these identities and their access is imperative to ensure that proper IAM, including permissions and active status, is executed on a regular basis. Managing the growing complexities of digital identities can be daunting especially with industry’s push toward cloud and hybrid computing environments; however, the need for IAM is more important today than ever. In recent years, we have seen various nation state-led cyber operations successfully access protected data by targeting the trust established within networks or by exploiting vulnerabilities in IAM products and/or IAM implementations

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Business & Careers Business Computer Security
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

The Ultimate Exam Prep A Comprehensive Study Guide for the AWS Certified Solutions Architect cover art
Microservices Architecture Handbook: Non-Programmer's Guide for Building Microservices cover art
Zero Trust and Third-Party Risk cover art
Cybersecurity cover art
Introduction to Cyber Security: Fundamentals cover art
Microservices with Kubernetes: Non-Programmer’s Handbook cover art
Cyber Intelligence Driven Risk cover art
Cyber Security cover art
Cyber Essentials cover art
Simple CISSP Exam Questions cover art
Essential CISA Exam Guide: Updated for the 26th Edition cover art
Cybersecurity for Beginners cover art
ISO27001/ISO27002: A Pocket Guide cover art
CISSP Exam Audio Study Guide! Practice Questions Edition! cover art
Certified Information Security Manager CISM Study Guide cover art
Eleventh Hour CISSP® cover art

What listeners say about Identity and Access Management

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.