Compliance Books
7 books in this category
Identity Management Design Guide with IBM Tivoli Identity Manager
Axel Buecker
Identity Management Design Guide with IBM Tivoli Identity Manager
Axel Buecker, Dr. Paul Ashley, Martin Borrett
This IBM Redbooks publication provides a comprehensive guide to designing and implementing identity management solutions using IBM Tivoli Identity Manager. It covers the full identity lifecycle from provisioning to deprovisioning, role-based access control, compliance reporting, and integration patterns with enterprise directories and applications.
NIST SP 800-63 Digital Identity Guidelines
Paul Grassi
NIST SP 800-63 Digital Identity Guidelines
Paul Grassi, James Fenton, Elaine Newton, Ray Perlner, Andrew Regenscheid
The NIST SP 800-63 Digital Identity Guidelines provide technical requirements for federal agencies implementing digital identity services. Revision 4 covers identity proofing (800-63A), authentication and lifecycle management (800-63B), and federation and assertions (800-63C). It defines Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL).
The Data Privacy and GDPR Handbook
Sanjay Sharma
The Data Privacy and GDPR Handbook
Sanjay Sharma
A comprehensive handbook for data privacy professionals covering GDPR implementation, data protection impact assessments, consent management, data subject rights, breach notification procedures, and ongoing compliance management.
Strategic Privacy by Design
R. Jason Cronk
Strategic Privacy by Design
R. Jason Cronk
This book provides a methodology for embedding privacy into systems and processes from the ground up. It covers privacy engineering frameworks, threat modeling for privacy, data minimization strategies, and building privacy-respecting identity systems.
EU GDPR: A Pocket Guide
Alan Calder
EU GDPR: A Pocket Guide
Alan Calder
A concise, accessible guide to the EU General Data Protection Regulation. It covers the key requirements, principles, and obligations for organizations handling EU personal data, making it an ideal quick reference.
Enterprise IAM Guidebook
Jeff Lombardo
Enterprise IAM Guidebook
Jeff Lombardo
A practical guide to building and maturing an enterprise IAM program. Covers program strategy, technology selection, role management, access governance, compliance, and organizational change management for IAM.
SOC 2 Compliance Handbook
Michael Rasmussen
SOC 2 Compliance Handbook
Michael Rasmussen
A practical guide to achieving SOC 2 compliance covering the Trust Services Criteria, scoping the audit, implementing controls (with emphasis on access controls and identity management), evidence collection, and maintaining continuous compliance.