Developer and Vendor Challenges Identity and Access Management cover art

Developer and Vendor Challenges Identity and Access Management

Preview
Get this deal Try Premium Plus free
Offer ends 29 January 2026 at 11:59PM GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Developer and Vendor Challenges Identity and Access Management

By: National Security Agency (NSA), Infrastructure Security Agency (CISA)
Narrated by: Tom Brooks
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends 29 January 2026 at 11:59PM GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £6.99

Buy Now for £6.99

LIMITED TIME OFFER | £0.99/mo for the first 3 months

Premium Plus auto-renews at £8.99/mo after 3 months. Terms apply.

About this listen

Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords. To strengthen the authentication process, Multi-Factor Authentication (MFA) requires the user to present multiple elements in different categories, or “factors,” as part of an authentication attempt. These factors are something you have, something you know, and something you are. Similarly, Single Sign-On (SSO) provides a risk mitigation capability by centralizing the management and control of authentication and access across multiple systems and from multiple identity providers.

Implemented properly, it can raise the authentication assurance level required for initial sign on and can control and secure the authentication and authorization information passed between systems.

Following on the work the Enduring Security Framework (ESF) published on identity and access management (IAM) best practices for administrators, targeted for administrators to make the best use of existing solutions, a working panel staffed by subject matter experts from both government and industry was tasked with assessing developer and vendor challenges relating to IAM. The working panel specifically identified the adoption and secure employment of MFA and SSO technologies as a key developer and vendor challenge that has been difficult to meet with the technology that is currently available.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Security & Encryption Technology Computer Security Management

Listeners also enjoyed...

The Blockchain Blueprint cover art
Zero Trust and Third-Party Risk cover art
Liquid Software cover art
Blockchain Basics cover art
Cyber Intelligence Driven Risk cover art
Data Mesh cover art
Computer Networking First Step cover art
Essential CISM: Updated for the 16th Edition CISM Review Manual cover art
Certified Information Security Manager CISM Study Guide cover art
Cybersecurity for Beginners cover art
Solutions Architect's Handbook cover art
Essential CISA Exam Guide: Updated for the 26th Edition cover art
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide cover art
Blockchain and the Law cover art
Prepare for the ISACA Certified Information Security Manager Exam cover art
ISO27001/ISO27002: A Pocket Guide cover art
No reviews yet