© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_11

11. Identity Management Controls in the Cyber Kill Chain

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

Managing and appropriately governing identities using an Identity Governance solution can make a big difference to the security posture of an organization. To best understand how, we must first learn from our collective past mistakes and omissions. Looking back over recent data breach reports and examining the forensic and post-incident analysis, we notice two things relative to the discussion on identity management controls. The first is that threat sophistication is increasing at a furious rate. ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.