Chapter 7: Identity and Access Management
In this chapter, we will be reviewing identity and access management in depth, as well as their importance within an enterprise today. With the shift to a decentralized user environment and everything moving to the cloud, identity has become extremely critical and the need to protect our user identities has never been more important. Since users can now access their corporate information from anywhere over the internet, a simple breach of their identity could allow an intruder to log in and access the user's information and any data they have access to within the environment. Because of this, we need to revisit the traditional method of using a username and password and add enhanced protection to our identity and access model, which will be covered in more detail in this chapter.
In today's world, the use of passwords is becoming obsolete. Because of ongoing major breaches and the advancement of technology, our passwords have most...