Identity attack vectors implementing an effective identity and access management solution
Morey J. Haber [and] Darran Rolls
- New York Apress c2020
- xxiii, 196 p. ill. 23 cm.
Reprint, 2024
Includes index
This helps to understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector; to implement an effective identity access management program to manage identities and roles and provide certification for regulatory compliance; to build upon industry standards to integrate key identity management technologies into a corporate ecosystem.