Listen free for 30 days

Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo + applicable taxes after 30 days. Cancel anytime.
Identity and Access Management cover art

Identity and Access Management

Written by: Cybersecurity and Infrastructure Security Agency
Narrated by: Tom Brooks
Try for $0.00

$14.95 a month after 30 days. Cancel anytime.

Buy Now for $18.74

Buy Now for $18.74

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Tax where applicable.

Publisher's Summary

Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials. Beyond the physical users, service and system accounts are also in scope for IAM and critical for IAM administrators to manage within their organizations. Inventorying, auditing, and tracking all of these identities and their access is imperative to ensure that proper IAM, including permissions and active status, is executed on a regular basis. Managing the growing complexities of digital identities can be daunting especially with industry’s push toward cloud and hybrid computing environments; however, the need for IAM is more important today than ever. In recent years, we have seen various nation state-led cyber operations successfully access protected data by targeting the trust established within networks or by exploiting vulnerabilities in IAM products and/or IAM implementations

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks

What listeners say about Identity and Access Management

Average Customer Ratings
Overall
  • 2 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 4 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 2 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    2 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    2 out of 5 stars

Serious issues

Describing passwordless technology as a memorized PIN is a massive mistake or someone from a sketchy marketing department. Passwordless doesn't include any something-you-know factors.

Also, not sure how you set a best practice about eliminating local accounts like root, which is impossible. You need to always manage any local accounts and shared accounts with a PAM system, along with any privilege personal privileged accounts.

Performance was good except not using the standard ways of saying acronyms.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!