In This Chapter
Controlling access to information, systems, devices, and facilities
Managing identification and authentication techniques
Integrating identity and access management in the cloud and on-premises
Understanding data access control mechanisms
Defending against access control attacks
Managing the identity and access provisioning lifecycle
Identity and access management (IAM) is a collection of processes and technologies that are used to control the access to critical assets. Together with other critical controls, IAM is a part of the core of information security: When implemented correctly, unauthorized persons are not permitted to access critical assets. Breaches and other abuses of information and assets are less likely to occur.
Security professionals must fully understand identity and access management concepts (including control ...