『Developer and Vendor Challenges Identity and Access Management』のカバーアート

Developer and Vendor Challenges Identity and Access Management

プレビューの再生
¥729で会員登録し購入 ¥630で会員登録し購入
期間限定:2025年12月1日(日本時間)に終了
2025年12月1日までプレミアムプランが3か月 月額99円キャンペーン開催中。300円分のKindle本クーポンも。 *適用条件あり。詳細はこちら
オーディオブック・ポッドキャスト・オリジナル作品など数十万以上の対象作品が聴き放題。
オーディオブックをお得な会員価格で購入できます。
会員登録は4か月目以降は月額1,500円で自動更新します。いつでも退会できます。
オーディオブック・ポッドキャスト・オリジナル作品など数十万以上の対象作品が聴き放題。
オーディオブックをお得な会員価格で購入できます。
30日間の無料体験後は月額¥1500で自動更新します。いつでも退会できます。

Developer and Vendor Challenges Identity and Access Management

著者: National Security Agency (NSA), Infrastructure Security Agency (CISA)
ナレーター: Tom Brooks
¥729で会員登録し購入 ¥630で会員登録し購入

期間限定:2025年12月1日(日本時間)に終了

30日間の無料体験後は月額¥1500で自動更新します。いつでも退会できます。

¥900 で購入

¥900 で購入

このコンテンツについて

Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords. To strengthen the authentication process, Multi-Factor Authentication (MFA) requires the user to present multiple elements in different categories, or “factors,” as part of an authentication attempt. These factors are something you have, something you know, and something you are. Similarly, Single Sign-On (SSO) provides a risk mitigation capability by centralizing the management and control of authentication and access across multiple systems and from multiple identity providers.

Implemented properly, it can raise the authentication assurance level required for initial sign on and can control and secure the authentication and authorization information passed between systems.

Following on the work the Enduring Security Framework (ESF) published on identity and access management (IAM) best practices for administrators, targeted for administrators to make the best use of existing solutions, a working panel staffed by subject matter experts from both government and industry was tasked with assessing developer and vendor challenges relating to IAM. The working panel specifically identified the adoption and secure employment of MFA and SSO technologies as a key developer and vendor challenge that has been difficult to meet with the technology that is currently available.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
インターネットセキュリティ・プライバシー セキュリティ・暗号化
まだレビューはありません