© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_15

15. Complexity Inherent in the IAM System

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

There is an inherent complexity in the entire fabric of Identity and Access Management that cannot be ignored during our discussion. This complexity is latent with flaws from multiple vendor interactions, various integration protocols and synchronization mechanisms, and the complex relationship between identities and assets. To better understand these problems, we will dive into a few that cause the most grief within an organization.

Separate Products and ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.