← Library
IAM Made Simple
Willy Danenberg
Made Simple Series
Progress1/43
1 Introduction πŸ”’ What Readers Say πŸ”’ Trademark, Copyright, and Legal Disclaimers πŸ”’ Copyright πŸ”’ About the Author πŸ”’ ISBN πŸ”’ Part I - Foundations of Identity Access Management πŸ”’ Chapter 1 - Why Identity Is the New Security Perimeter πŸ”’ Chapter 2 - What Identity Access Management Really Means πŸ”’ Chapter 3 - The Building Blocks of Identity Access Management πŸ”’ Chapter 4 - Who Needs Identity Access Management and Why πŸ”’ Part II - Governance, Lifecycle, and Privileged Control πŸ”’ Chapter 5 - The Risks Identity Access Management Is Designed to Control πŸ”’ Chapter 6 - Authentication Explained Clearly πŸ”’ Chapter 7 - Authorization and Access Control Models Explained Clearly πŸ”’ Chapter 8 - Identity Lifecycle Management: From Joiner to Leaver πŸ”’ Chapter 9 - Privileged Access Management: Controlling High-Impact Identities πŸ”’ Part III - Compliance, Architecture, and Identity Governance πŸ”’ Chapter 10 - Single Sign-On and Federation: Trust Across Systems πŸ”’ Chapter 11 - IAM Architecture: Designing Identity as a Control System πŸ”’ Chapter 12 - Identity Governance and Administration: Controlling Access with Accountability πŸ”’ Part IV - Compliance, Collaboration, Remote Access, APIs, and Certificates πŸ”’ Chapter 13 - IAM and Regulatory Compliance: GDPR, DORA, and Beyond πŸ”’ Chapter 14 - IAM in Collaboration Platforms: Email, SharePoint, Teams, and Modern Workspaces πŸ”’ Chapter 15 - IAM in Remote Access: VPN, Zero Trust, and Secure Connectivity πŸ”’ Chapter 16 - IAM for APIs, Applications, and Digital Ecosystems πŸ”’ Chapter 17 - Certificates and Cryptographic Identity: Establishing Digital Trust πŸ”’ Part V - Resilience, Operations, and Measurable Control πŸ”’ Chapter 18 - IAM Incident Management: Detecting, Containing, and Recovering from Identity Compromise πŸ”’ Chapter 19 - IAM Operations and Service Management: Running Identity as a Critical Service πŸ”’ Chapter 20 - IAM Metrics, Maturity Models, and Strategic Road mapping πŸ”’ Part VI - Zero Trust, Complex Environments, Testing, and Future Readiness πŸ”’ Chapter 21 - Zero Trust and Identity-Centric Security πŸ”’ Chapter 22 - IAM in Factories, Kiosks, Shared Devices, and Constrained Environments πŸ”’ Chapter 23 - Practical IAM Test Cases and Failure Scenarios πŸ”’ Chapter 24 - IAM Implementation Strategy and Change Management πŸ”’ Chapter 25 - The Future of Identity Access Management πŸ”’ Chapter 26 - Identity Access Management Made Simple: Consolidation and Practical Guidance πŸ”’ Annex 1 - IAM Control Checklist and Self-Assessment Framework πŸ”’ Annex 2 - Sample IAM Governance Charter Template πŸ”’ Annex 3 - Sample IAM Implementation Roadmap Template πŸ”’ Annex 4 - Sample IAM Policy Structure and Documentation Framework πŸ”’ Annex 5 - IAM KPIs, KRIs, and Executive Reporting Templates
πŸ“¦ Amazon Print πŸ›’ Digital β€” €14.95
IAM Made Simple β€Ί Introduction
πŸ‘ Tenant πŸ”“ Full
1 / 43

Introduction

About this book
IAM Made Simple
by Willy Danenberg
Made Simple Series
43 chapters Technology Architecture EUR 14.95

Identity Access Management IAM Made Simple

From Authentication to Zero Trust: Governance, Compliance, Machine Identity, and Operational Resilience Explained Clearly

Willy DANENBERG

1/43 πŸ”’ Purchase to continue
BBB GRC Platform
v1.0.0
⏻
πŸ” Esc
No results found
πŸ“‹ My Tasks
GRC OK - 2026-04-23 05:40:23