Chapter 7
Identity and Access Management
IN THIS CHAPTER
Controlling physical and logical access to assets
Managing identification and authentication of people, devices, and services
Federating identity with a third-party service
Implementing and managing authorization mechanisms
Managing the identity and access provisioning life cycle
Implementing authentication systems
Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. In fact, in the modern cloud era, with ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.” Security professionals must have a thorough understanding of the concepts and technologies involved. This domain represents 13 percent of the CISSP certification exam.
IAM is a ...
Get CISSP For Dummies, 7th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.