Skip to main content
DI

Identity Governance Books

6 books in this category

Identity Management Design Guide with IBM Tivoli Identity Manager

Axel Buecker

Identity Management Design Guide with IBM Tivoli Identity Manager

Axel Buecker, Dr. Paul Ashley, Martin Borrett

4.1

This IBM Redbooks publication provides a comprehensive guide to designing and implementing identity management solutions using IBM Tivoli Identity Manager. It covers the full identity lifecycle from provisioning to deprovisioning, role-based access control, compliance reporting, and integration patterns with enterprise directories and applications.

advancedIAMIdentity Governance

Identity Attack Vectors

Morey J. Haber

Identity Attack Vectors

Morey J. Haber, Darran Rolls

4.3

Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.

intermediateIAMCybersecurity

Enterprise IAM Guidebook

Jeff Lombardo

Enterprise IAM Guidebook

Jeff Lombardo

4.1

A practical guide to building and maturing an enterprise IAM program. Covers program strategy, technology selection, role management, access governance, compliance, and organizational change management for IAM.

intermediateIAMIdentity Governance

SCIM: System for Cross-domain Identity Management

Phil Hunt

SCIM: System for Cross-domain Identity Management

Phil Hunt, Kelly Grizzle

3.9

The implementer's guide to SCIM (System for Cross-domain Identity Management), the standard protocol for automating user provisioning and deprovisioning across cloud applications. Covers the SCIM schema, operations, filtering, bulk operations, and implementation best practices.

advancedIAMIdentity Governance

Mastering Active Directory

Dishan Francis

Mastering Active Directory

Dishan Francis

4.3

A comprehensive guide to Active Directory Domain Services covering design, deployment, group policy, certificate services, federation (AD FS), Azure AD integration, security hardening, and troubleshooting in enterprise environments.

advancedIAMIdentity Governance

SOC 2 Compliance Handbook

Michael Rasmussen

SOC 2 Compliance Handbook

Michael Rasmussen

4.1

A practical guide to achieving SOC 2 compliance covering the Trust Services Criteria, scoping the audit, implementing controls (with emphasis on access controls and identity management), evidence collection, and maintaining continuous compliance.

intermediateComplianceIdentity Governance