Abstract
Identity attacks cannot be prevented or solved with any single technology, tool, or technique. There is no pinch-hit quick solution. Identity and access management is an ongoing process that invariably must become a critical part of how you manage security for your infrastructure. Best practice IAM must be adopted as a part of the company culture and comprehensively implemented as part of a continuous management approach to the multiple changes, threats, and risks within your environment. In practice, this is a process that never stops since your business never stops.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Morey J. Haber, Darran Rolls
About this chapter
Cite this chapter
Haber, M.J., Rolls, D. (2020). Conclusion. In: Identity Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5165-2_21
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5165-2_21
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5164-5
Online ISBN: 978-1-4842-5165-2
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)