← Library
IAM Made Simple
Willy Danenberg
Made Simple Series
Progress7/43
1 Introduction πŸ”’ What Readers Say πŸ”’ Trademark, Copyright, and Legal Disclaimers πŸ”’ Copyright πŸ”’ About the Author πŸ”’ ISBN πŸ”’ Part I - Foundations of Identity Access Management πŸ”’ Chapter 1 - Why Identity Is the New Security Perimeter πŸ”’ Chapter 2 - What Identity Access Management Really Means πŸ”’ Chapter 3 - The Building Blocks of Identity Access Management πŸ”’ Chapter 4 - Who Needs Identity Access Management and Why πŸ”’ Part II - Governance, Lifecycle, and Privileged Control πŸ”’ Chapter 5 - The Risks Identity Access Management Is Designed to Control πŸ”’ Chapter 6 - Authentication Explained Clearly πŸ”’ Chapter 7 - Authorization and Access Control Models Explained Clearly πŸ”’ Chapter 8 - Identity Lifecycle Management: From Joiner to Leaver πŸ”’ Chapter 9 - Privileged Access Management: Controlling High-Impact Identities πŸ”’ Part III - Compliance, Architecture, and Identity Governance πŸ”’ Chapter 10 - Single Sign-On and Federation: Trust Across Systems πŸ”’ Chapter 11 - IAM Architecture: Designing Identity as a Control System πŸ”’ Chapter 12 - Identity Governance and Administration: Controlling Access with Accountability πŸ”’ Part IV - Compliance, Collaboration, Remote Access, APIs, and Certificates πŸ”’ Chapter 13 - IAM and Regulatory Compliance: GDPR, DORA, and Beyond πŸ”’ Chapter 14 - IAM in Collaboration Platforms: Email, SharePoint, Teams, and Modern Workspaces πŸ”’ Chapter 15 - IAM in Remote Access: VPN, Zero Trust, and Secure Connectivity πŸ”’ Chapter 16 - IAM for APIs, Applications, and Digital Ecosystems πŸ”’ Chapter 17 - Certificates and Cryptographic Identity: Establishing Digital Trust πŸ”’ Part V - Resilience, Operations, and Measurable Control πŸ”’ Chapter 18 - IAM Incident Management: Detecting, Containing, and Recovering from Identity Compromise πŸ”’ Chapter 19 - IAM Operations and Service Management: Running Identity as a Critical Service πŸ”’ Chapter 20 - IAM Metrics, Maturity Models, and Strategic Road mapping πŸ”’ Part VI - Zero Trust, Complex Environments, Testing, and Future Readiness πŸ”’ Chapter 21 - Zero Trust and Identity-Centric Security πŸ”’ Chapter 22 - IAM in Factories, Kiosks, Shared Devices, and Constrained Environments πŸ”’ Chapter 23 - Practical IAM Test Cases and Failure Scenarios πŸ”’ Chapter 24 - IAM Implementation Strategy and Change Management πŸ”’ Chapter 25 - The Future of Identity Access Management πŸ”’ Chapter 26 - Identity Access Management Made Simple: Consolidation and Practical Guidance πŸ”’ Annex 1 - IAM Control Checklist and Self-Assessment Framework πŸ”’ Annex 2 - Sample IAM Governance Charter Template πŸ”’ Annex 3 - Sample IAM Implementation Roadmap Template πŸ”’ Annex 4 - Sample IAM Policy Structure and Documentation Framework πŸ”’ Annex 5 - IAM KPIs, KRIs, and Executive Reporting Templates
πŸ“¦ Amazon Print πŸ›’ Digital β€” €14.95
IAM Made Simple β€Ί Part I - Foundations of Identity Access Management
πŸ‘ Tenant πŸ”“ Full
Part 7 / 43

Part I - Foundations of Identity Access Management

This part establishes why IAM exists and what it means in practice. It begins with the shift from network-centric security to identity-centric security and explains why identity has become the foundation of digital trust in cloud, remote work, collaboration, APIs, and industrial environments. It then defines IAM clearly, removes common misunderstandings, and introduces the essential building blocks that make IAM work in real organizations.

By the end of this part, the reader understands the β€œwhy” of IAM, the language of IAM, and the core components that appear in every IAM program, regardless of industry or technology stack.

πŸ”’
Full access required
Purchase the full edition to read all 43 chapters of this book.
BBB GRC Platform
v1.0.0
⏻
πŸ” Esc
No results found
πŸ“‹ My Tasks
GRC OK - 2026-04-23 05:40:23