48,14 €*
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance
See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link
Build upon industry standards to integrate key identity management technologies into a corporate ecosystem
Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments
Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance
See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link
Build upon industry standards to integrate key identity management technologies into a corporate ecosystem
Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments
Chapter 1: The Three Pillars of Cybersecurity.- Chapter 2: A Nuance on Lateral Movement .- Chapter 3: The Five A's of Enterprise IAM.- Chapter 4: Understanding Enterprise Identity.- Chapter 5: BOTS .- Chapter 6: Identity Governance Defined.- Chapter 7: The Identity Governance Process.- Chapter 8: Meeting Regulatory Compliance Mandates.- Chapter 9: Indicators of Compromise.- Chapter 10: Identity Attack Vectors.- Chapter 11: Identity Management Controls in the Cyber Kill Chain .- Chapter 12: Identity Management Program Planning .- Chapter 13: Privileged Access Management.- Chapter 14: Just-In-Time Access Management.- Chapter 15: Identity Obfuscation.- Chapter 16: System for Cross-domain Identity Management (SCIM).- Chapter 17: Remote Access.- Chapter 18: Identity-Based Threat Response.- Chapter 19: Biometric Risks Related to Identities.- Chapter 20: Blockchain and Identity Management.- Chapter 21: Conclusion.
Erscheinungsjahr: | 2020 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Seiten: | 196 |
ISBN-13: | 9781484251645 |
ISBN-10: | 1484251644 |
Sprache: | Englisch |
Herstellernummer: | 978-1-4842-5164-5 |
Autor: |
Haber, Morey J.
Rolls, Darran |
Auflage: | 1st ed. |
Hersteller: |
Apress
Springer, Berlin |
Abbildungen: | XXIII, 196 p. 33 illus. |
Maße: | 15 x 179 x 256 mm |
Von/Mit: | Morey J. Haber (u. a.) |
Erscheinungsdatum: | 21.02.2020 |
Gewicht: | 0,424 kg |
Chapter 1: The Three Pillars of Cybersecurity.- Chapter 2: A Nuance on Lateral Movement .- Chapter 3: The Five A's of Enterprise IAM.- Chapter 4: Understanding Enterprise Identity.- Chapter 5: BOTS .- Chapter 6: Identity Governance Defined.- Chapter 7: The Identity Governance Process.- Chapter 8: Meeting Regulatory Compliance Mandates.- Chapter 9: Indicators of Compromise.- Chapter 10: Identity Attack Vectors.- Chapter 11: Identity Management Controls in the Cyber Kill Chain .- Chapter 12: Identity Management Program Planning .- Chapter 13: Privileged Access Management.- Chapter 14: Just-In-Time Access Management.- Chapter 15: Identity Obfuscation.- Chapter 16: System for Cross-domain Identity Management (SCIM).- Chapter 17: Remote Access.- Chapter 18: Identity-Based Threat Response.- Chapter 19: Biometric Risks Related to Identities.- Chapter 20: Blockchain and Identity Management.- Chapter 21: Conclusion.
Erscheinungsjahr: | 2020 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Seiten: | 196 |
ISBN-13: | 9781484251645 |
ISBN-10: | 1484251644 |
Sprache: | Englisch |
Herstellernummer: | 978-1-4842-5164-5 |
Autor: |
Haber, Morey J.
Rolls, Darran |
Auflage: | 1st ed. |
Hersteller: |
Apress
Springer, Berlin |
Abbildungen: | XXIII, 196 p. 33 illus. |
Maße: | 15 x 179 x 256 mm |
Von/Mit: | Morey J. Haber (u. a.) |
Erscheinungsdatum: | 21.02.2020 |
Gewicht: | 0,424 kg |