© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_13

13. Six Steps to Identity Security

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 
Identity security is the risk management for everything included in Identity Access and Management. This chapter was written to help identify the core areas of identity security, presenting each key capability that you, as a security professional, should implement across your entire identity fabric and ensure your IAM vendors are aligned to providing information to identify identity threats. The illustration in Figure 13-1 is designed to help you visualize these ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.