Further reading
For more information regarding the topics that were covered in this chapter, take a look at the following resources:
- Identity and Access Management: https://digitalguardian.com/blog/what-identity-and-access-management-iam
- Identity and Access Management 101: https://www.okta.com/identity-101/identity-and-access-management/
- Identity and Access Management: https://docs.microsoft.com/en-us/azure/security/fundamentals/identity-management-overview
- Identity and Access Management: https://www.onelogin.com/learn
- Data Encryption: https://digitalguardian.com/blog/what-data-encryption
- Data Encryption: https://www.forcepoint.com/cyber-edu/data-encryption
- Fundamentals of Data Encryption: https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest
- What is Encryption: https://us.norton.com/internetsecurity-privacy-what-is-encryption.html
- Common Storage Encryption: https://docs.microsoft.com/en-us/azure/storage/common/storage...