Identity and Access Management
- Length: 648 pages
- Edition: 1
- Language: English
- Publisher: Syngress
- Publication Date: 2013-12-10
- ISBN-10: 0124081401
- ISBN-13: 9780124081406
- Sales Rank: #321615 (See Top 100 Books)
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.
- Focuses on real-word implementations
- Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
- Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
- Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates
Table of Contents
Part 1 Business Case and Current State
Chapter 1 Business Requirements and Business Case Development
Chapter 2 IAM Framework, Key Principles, and Definitions
Chapter 3 Current State and Capability Maturity
Chapter 4 Common Challenges and Key Considerations
Chapter 5 Case Study: Access Reviews
Part 2 Future State and Roadmap
Chapter 6 Future State Definition
Chapter 7 IAM Roadmap and Strategy
Chapter 8 Identity and Access Intelligence: A Risk-Based Approach
Chapter 9 Enabling Business Through Cloud-Based IAM
Chapter 10 Case Study: Future State—Finding a Way Out of the Labyrinth
Part 3 Implementation
Chapter 11 Implementation Methodology and Approach
Chapter 12 Access Request, Approval, and Provisioning
Chapter 13 Enforcement
Chapter 14 Access Review and Certification
Chapter 15 Privileged Access Management
Chapter 16 Roles and Rules
Chapter 17 IAM Product Selection
Chapter 18 Case Study: Implementation
Part 4 Identity and Access Management Forecast
Chapter 19 The Future of Identity and Access Management