13
Identity Management Implementation
Identity components are important to securing an organization’s resources because you only want authorized users to access objects when they need them. For example, if attackers compromise an identity management (IdM) system and breach a server room that is generating millions of dollars in monthly revenue, the business will lose the critical functions of paying its staff and delivering products. It is essential to protect these critical functions by safeguarding the organization through deploying an IdM system.
The ability to connect systems has made collaboration between organizations easier, and thus more and more common. It could be sharing online resources to upskill employees or working together on ...
Get Certified Information Systems Security Professional (CISSP) Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.