Designing an Identity Security Strategy
The previous chapter discussed the design for an identity security strategy and how to evaluate a strategy for security operations while utilizing the concept of Zero Trust. This chapter will discuss how to design an identity security strategy for cloud-native, hybrid, and multi-cloud identity and access management infrastructures. This will include understanding the design criteria and recommendations of a Zero Trust strategy for identity and access management for internal tenants, external customers and partners, and hybrid architectures.
In this chapter, we are going to cover the following main topics:
- Zero Trust for identity and access management
- Designing a strategy for access to cloud resources
- Recommending an identity store (tenants, B2B, B2C)
- Recommending an authentication and authorization strategy
- Designing a strategy for conditional access (CA)
- Designing a strategy for role assignment and delegation ...