© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_17

17. Remote Access

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

One of the challenges for remote access technology is providing role-based access to groups and individuals outside of your organization. Their assets are essentially untrusted, and their accounts often fall outside of your control. They are essentially foreign entities that need validation and authentication before any connection or remote session can occur. This typically occurs for vendors and contractors that need remote access into your environment, but there is no directory service or authoritative store that can be established ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.