16

IAM Design

This chapter on Identity and Access Management (IAM) will unravel the intricacies of processes and technologies designed to ensure secure access to organizational resources. You will first explore the components of Identity Management (IDM) and Access Management (AM), emphasizing user provisioning, role definition, and password management. The chapter then moves on to privileged user management, shedding light on the oversight of elevated access privileges, with a focus on Multi-Factor Authentication (MFA) and audit considerations. You will thoroughly examine centralized directory services and their role as repositories for efficient user IDM. You will finaly have a comprehensive overview of Federated Identity, Single Sign-On ...

Get CCSP (ISC)2 Certified Cloud Security Professional Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.