© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_16

16. Identity Technical Debt

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

Identity technical debt is kryptonite for the prosperity and longevity of any technology-based business. At some point in time, legacy components, software, and aging assets and resources will no longer meet modern business demands and information security requirements. After the short duration of seven years, many components will be designated as end-of-life and will be queued for replacement or modernization. After all, most endpoint hardware does not even last that ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.