Summary
This chapter shows how important the identity and access management function is within the cybersecurity program. Identity and access management is not just simply providing an ID to your user so they can accomplish their responsibilities, although, to them, it may look that easy. Under the covers, there is an extraordinarily large amount of processes and complexity involved. With complexity comes increased risk and the need to ensure you have the correct resources in place, and continuing to simplify and modernize your identity and access management program is critical. Every IdP will have different capabilities so it will be important to work closely with them to ensure they are providing the most advanced identity protection capabilities, as reviewed in this chapter.
As we journeyed through this chapter, we first completed a review of identity access and management and covered IAAA in detail, which provided the foundation for your identity and access management program...