4

Designing an Identity Security Strategy

The previous chapter discussed the design for an identity security strategy and how to evaluate a strategy for security operations while utilizing the concept of Zero Trust. This chapter will discuss how to design an identity security strategy for cloud-native, hybrid, and multi-cloud identity and access management infrastructures. This will include understanding the design criteria and recommendations of a Zero Trust strategy for identity and access management for internal tenants, external customers and partners, and hybrid architectures.

In this chapter, we are going to cover the following main topics:

  • Zero Trust for identity and access management
  • Designing a strategy for access to cloud resources ...

Get Microsoft Cybersecurity Architect Exam Ref SC-100 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.