Identity and Access Management cover art

Identity and Access Management

Recommended Best Practices for Administrators

Preview

Try Premium Plus free
1 credit a month to buy any audiobook in our entire collection.
Access to thousands of additional audiobooks and Originals from the Plus Catalogue.
Member-only deals & discounts.
Auto-renews at $16.45/mo after 30 days. Cancel anytime.

Identity and Access Management

By: Cybersecurity and Infrastructure Security Agency
Narrated by: Tom Brooks
Try Premium Plus free

$16.45 per month after 30 days. Cancel anytime.

Buy Now for $16.99

Buy Now for $16.99

Confirm Purchase
Pay using voucher balance (if applicable) then card ending in
By confirming your purchase, you agree to Audible's Conditions Of Use and Privacy Notice and authorise Audible to charge your designated credit card or another available credit card on file.
Cancel

About this listen

Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials. Beyond the physical users, service and system accounts are also in scope for IAM and critical for IAM administrators to manage within their organizations. Inventorying, auditing, and tracking all of these identities and their access is imperative to ensure that proper IAM, including permissions and active status, is executed on a regular basis. Managing the growing complexities of digital identities can be daunting especially with industry’s push toward cloud and hybrid computing environments; however, the need for IAM is more important today than ever. In recent years, we have seen various nation state-led cyber operations successfully access protected data by targeting the trust established within networks or by exploiting vulnerabilities in IAM products and/or IAM implementations

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Business & Careers Business Computer Security

What listeners say about Identity and Access Management

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.