Skip to Main Content
Infosec Strategies and Best Practices
book

Infosec Strategies and Best Practices

by Joseph MacMillan
May 2021
Beginner content levelBeginner
272 pages
6h 50m
English
Packt Publishing
Content preview from Infosec Strategies and Best Practices

Chapter 5: Controlling Access and Managing Identity

Well, well, well… look who we have here. It's you! Not to mention the thirst for knowledge about controlling access and managing identity that you brought along. That's so great, and quite a coincidence, as this chapter actually covers those topics.

Identity and Access Management, or IAM, helps with understanding both the people and the automated services that are doing all of the CRUD (short for Creating, Reading, Updating, and Deleting) in your estate. That sounds important because it is important. How else can you ensure an entity is actually the approved user they claim to be?

Also, based on previous chapters, we have described certain levels of permission based on various aspects of ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Vulnerability Management

Practical Vulnerability Management

Andrew Magnusson

Publisher Resources

ISBN: 9781800566354