Skip to main content
DI

Compliance Books

7 books in this category

Identity Management Design Guide with IBM Tivoli Identity Manager

Axel Buecker

Identity Management Design Guide with IBM Tivoli Identity Manager

Axel Buecker, Dr. Paul Ashley, Martin Borrett

4.1

This IBM Redbooks publication provides a comprehensive guide to designing and implementing identity management solutions using IBM Tivoli Identity Manager. It covers the full identity lifecycle from provisioning to deprovisioning, role-based access control, compliance reporting, and integration patterns with enterprise directories and applications.

advancedIAMIdentity Governance

NIST SP 800-63 Digital Identity Guidelines

Paul Grassi

NIST SP 800-63 Digital Identity Guidelines

Paul Grassi, James Fenton, Elaine Newton, Ray Perlner, Andrew Regenscheid

4.7

The NIST SP 800-63 Digital Identity Guidelines provide technical requirements for federal agencies implementing digital identity services. Revision 4 covers identity proofing (800-63A), authentication and lifecycle management (800-63B), and federation and assertions (800-63C). It defines Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL).

referenceComplianceIAM

The Data Privacy and GDPR Handbook

Sanjay Sharma

The Data Privacy and GDPR Handbook

Sanjay Sharma

4.2

A comprehensive handbook for data privacy professionals covering GDPR implementation, data protection impact assessments, consent management, data subject rights, breach notification procedures, and ongoing compliance management.

intermediatePrivacyCompliance

Strategic Privacy by Design

R. Jason Cronk

Strategic Privacy by Design

R. Jason Cronk

4

This book provides a methodology for embedding privacy into systems and processes from the ground up. It covers privacy engineering frameworks, threat modeling for privacy, data minimization strategies, and building privacy-respecting identity systems.

advancedPrivacyCompliance

EU GDPR: A Pocket Guide

Alan Calder

EU GDPR: A Pocket Guide

Alan Calder

4

A concise, accessible guide to the EU General Data Protection Regulation. It covers the key requirements, principles, and obligations for organizations handling EU personal data, making it an ideal quick reference.

beginnerPrivacyCompliance

Enterprise IAM Guidebook

Jeff Lombardo

Enterprise IAM Guidebook

Jeff Lombardo

4.1

A practical guide to building and maturing an enterprise IAM program. Covers program strategy, technology selection, role management, access governance, compliance, and organizational change management for IAM.

intermediateIAMIdentity Governance

SOC 2 Compliance Handbook

Michael Rasmussen

SOC 2 Compliance Handbook

Michael Rasmussen

4.1

A practical guide to achieving SOC 2 compliance covering the Trust Services Criteria, scoping the audit, implementing controls (with emphasis on access controls and identity management), evidence collection, and maintaining continuous compliance.

intermediateComplianceIdentity Governance