4
Designing an Identity Security Strategy
The previous chapter discussed the design for an identity security strategy and how to evaluate a strategy for security operations while utilizing the concept of Zero Trust. This chapter will discuss how to design an identity security strategy for cloud-native, hybrid, and multi-cloud identity and access management infrastructures. This will include understanding the design criteria and recommendations of a Zero Trust strategy for identity and access management for internal tenants, external customers and partners, and hybrid architectures.
In this chapter, we are going to cover the following main topics:
- Zero Trust for identity and access management
- Designing a strategy for access to cloud resources ...
Get Microsoft Cybersecurity Architect Exam Ref SC-100 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.