From the course: NIST CSF 2.0: Empower Your Organization to Navigate the Modern Cybersecurity Threat Landscape

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Identity and access management

Identity and access management

- Back in my day, cybersecurity was like defending a medieval castle. You built thick walls called firewalls, dug deep moats in the form of network segmentation, and hoped the bad guys stayed outside. But today, with cloud services, remote workforces and mobile devices, there is no single wall. The identity of your users, the who, not the where, is the new perimeter. When you think about a cybersecurity breach, you probably imagine a hacker typing furiously to bypass a company's defenses. But often they don't need to hack in at all. Seriously, they just log in. That's why access control and identity management are the digital equivalents of guarding the gates to your kingdom. If you hand out keys to everyone without tracking who has them or worse, leave the front door wide open, don't be surprised when you find strangers eating at your dining room table. Every employee, contractor, or even vendor account is a potential…

Contents