Identity and Access Management
Recommended Best Practices for Administrators
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 18,74 $
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
-
Narrateur(s):
-
Tom Brooks
À propos de cet audio
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials. Beyond the physical users, service and system accounts are also in scope for IAM and critical for IAM administrators to manage within their organizations. Inventorying, auditing, and tracking all of these identities and their access is imperative to ensure that proper IAM, including permissions and active status, is executed on a regular basis. Managing the growing complexities of digital identities can be daunting especially with industry’s push toward cloud and hybrid computing environments; however, the need for IAM is more important today than ever. In recent years, we have seen various nation state-led cyber operations successfully access protected data by targeting the trust established within networks or by exploiting vulnerabilities in IAM products and/or IAM implementations
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2023 Tom Brooks (P)2023 Tom BrooksCe que les auditeurs disent de Identity and Access Management
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
-
Performance
-
Histoire
- Utilisateur anonyme
- 2024-10-04
This book in NOT for IAM professionals and will have little use for someone living outside of USA.
It has some value for those considering a career in Information Security, but it is so boring that it may act as a deterrent. This book is not worth your money.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Clifford Dutka
- 2023-05-17
Serious issues
Describing passwordless technology as a memorized PIN is a massive mistake or someone from a sketchy marketing department. Passwordless doesn't include any something-you-know factors.
Also, not sure how you set a best practice about eliminating local accounts like root, which is impossible. You need to always manage any local accounts and shared accounts with a PAM system, along with any privilege personal privileged accounts.
Performance was good except not using the standard ways of saying acronyms.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.