Identity Governance Books
6 books in this category
Identity Management Design Guide with IBM Tivoli Identity Manager
Axel Buecker
Identity Management Design Guide with IBM Tivoli Identity Manager
Axel Buecker, Dr. Paul Ashley, Martin Borrett
This IBM Redbooks publication provides a comprehensive guide to designing and implementing identity management solutions using IBM Tivoli Identity Manager. It covers the full identity lifecycle from provisioning to deprovisioning, role-based access control, compliance reporting, and integration patterns with enterprise directories and applications.
Identity Attack Vectors
Morey J. Haber
Identity Attack Vectors
Morey J. Haber, Darran Rolls
Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.
Enterprise IAM Guidebook
Jeff Lombardo
Enterprise IAM Guidebook
Jeff Lombardo
A practical guide to building and maturing an enterprise IAM program. Covers program strategy, technology selection, role management, access governance, compliance, and organizational change management for IAM.
SCIM: System for Cross-domain Identity Management
Phil Hunt
SCIM: System for Cross-domain Identity Management
Phil Hunt, Kelly Grizzle
The implementer's guide to SCIM (System for Cross-domain Identity Management), the standard protocol for automating user provisioning and deprovisioning across cloud applications. Covers the SCIM schema, operations, filtering, bulk operations, and implementation best practices.
Mastering Active Directory
Dishan Francis
Mastering Active Directory
Dishan Francis
A comprehensive guide to Active Directory Domain Services covering design, deployment, group policy, certificate services, federation (AD FS), Azure AD integration, security hardening, and troubleshooting in enterprise environments.
SOC 2 Compliance Handbook
Michael Rasmussen
SOC 2 Compliance Handbook
Michael Rasmussen
A practical guide to achieving SOC 2 compliance covering the Trust Services Criteria, scoping the audit, implementing controls (with emphasis on access controls and identity management), evidence collection, and maintaining continuous compliance.