Chapter 7

Identity and Access Management


check Controlling access to information, systems, devices, and facilities

check Managing identification and authentication techniques

check Integrating identity and access management in the cloud and on-premises

check Understanding data access control mechanisms

check Defending against access control attacks

check Managing the identity and access provisioning lifecycle

Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. In fact, in the modern cloud era with ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.” Security professionals must have a thorough understanding of the concepts and technologies involved. This domain represents 13 percent of the CISSP certification ...

Get CISSP For Dummies, 6th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.