Access Control and Identity Management

Transforming Access Control Policies and Standards into Procedures and Guidelines

Access controls limit who can be in a specific area and what they can do once they get into an area. This area can be physical, such as a building, or logical, like a file structure. Limiting access on a personal or enterprise network will assist in securing what “lives” on that network, such as documents and personal information. Access controls are a cornerstone to a secure and vital network.

An important part of any access control system is creating clear guidelines and instructions for using it. In this section, you will learn how to use policies and standards as the foundation for creating access control system ...

Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.