Identity and Access Management
You have already heard me say a couple of times that identity is now considered the new perimeter of your organization. Because of this, the need for a mature identity and access management program is a necessity. Identity and access management needs a dedicated function within the cybersecurity program because of how important this area has become. Through the ongoing shift to work from anywhere at any time and with data centers continuing to shift to the cloud, users can now access their corporate information from anywhere over the internet. A simple breach of identity will allow an intruder to log in and access information for that compromised user, then laterally move through the network to create a lot more damage. Because of this, we need to revisit the traditional authentication methods and add enhanced protection to our identity and access model.
We will begin the chapter with an overview of identity and access management and many of the...