Chapter 7

Identity and Access Management

IN THIS CHAPTER

Bullet Controlling physical and logical access to assets

Bullet Managing identification and authentication of people, devices, and services

Bullet Federating identity with a third-party service

Bullet Implementing and managing authorization mechanisms

Bullet Managing the identity and access provisioning life cycle

Bullet Implementing authentication systems

Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. In fact, in the modern cloud era, with ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.” Security professionals must have a thorough understanding of the concepts and technologies involved. This domain represents 13 percent of the CISSP certification exam.

IAM is a ...

Get CISSP For Dummies, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.