© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_12

12. The Identity Cyber Kill Chain

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

It’s obvious there are some problems in identity security to be solved, but the question remains: How do we better protect ourselves? Managing identities with IGA, IAM, and PAM solutions and following best practices really does make a difference to the security posture of an organization. To best understand how, we must first learn from our collective past mistakes and embrace the knowledge of others who have tamed the path. The best example of this is the NIST Cybersecurity ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.