O'Reilly logo

CISSP For Dummies, 6th Edition by Peter H. Gregory, Lawrence C. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Identity and Access Management

IN THIS CHAPTER

check Controlling access to information, systems, devices, and facilities

check Managing identification and authentication techniques

check Integrating identity and access management in the cloud and on-premises

check Understanding data access control mechanisms

check Defending against access control attacks

check Managing the identity and access provisioning lifecycle

Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. In fact, in the modern cloud era with ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.” Security professionals must have a thorough understanding of the concepts and technologies involved. This domain represents 13 percent of the CISSP certification ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required