O'Reilly logo

CISSP For Dummies, 5th Edition by Peter H. Gregory, Lawrence C. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Identity and Access Management

In This Chapter

arrow Controlling access to information, systems, devices, and facilities

arrow Managing identification and authentication techniques

arrow Integrating identity and access management in the cloud and on-premises

arrow Understanding data access control mechanisms

arrow Defending against access control attacks

arrow Managing the identity and access provisioning lifecycle

Identity and access management (IAM) is a collection of processes and technologies that are used to control the access to critical assets. Together with other critical controls, IAM is a part of the core of information security: When implemented correctly, unauthorized persons are not permitted to access critical assets. Breaches and other abuses of information and assets are less likely to occur.

Security professionals must fully understand identity and access management concepts (including control ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required