O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter has covered foundational concepts in the Identity and Access Management (IAM) domain. The core of identity management is enrolling user identities and provisioning. An important concern related to identities is Identity Theft. All core services of identity and access are also offered by third-party service providers on a subscription model and are delivered as a service from cloud.

Continued in the next chapter are the topics of this domain pertaining to access management with a focus on access control concepts, methods, attacks, and countermeasures.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required