6 IDENTITY AND ACCESS MANAGEMENT
At the beginning of my information security career, if you’d asked me which area I’d spend the most time on over the next decade, IAM wouldn’t have been anywhere near the top of my list. Looking back now, it’s a strong contender for the very top spot. There are multiple reasons why this turned out to be the case. IAM projects are complex, time-consuming affairs. Information security compliance standards place large emphasis on the area, and increased awareness of insider threats has driven security operations teams to be more introspective; these are but a few of those reasons. Knowing who can access what, and what they can do once they’ve accessed it, is important when monitoring an environment, and increases ...
Get Security Operations in Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.