Abstract
There are lots of frameworks to help you define, organize, implement, and improve security. Initiatives like the Control Objectives for Information and Related Technology (COBIT), the US National Institute of Standards and Technology (NIST) Cybersecurity Framework, and the International Standards Organization (ISO) 27K all provide frameworks to guide security program thinking. They are frameworks, because they provide extensive guidance on everything from funding to security incident response readiness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Morey J. Haber, Darran Rolls
About this chapter
Cite this chapter
Haber, M.J., Rolls, D. (2020). The Five A’s of Enterprise IAM. In: Identity Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5165-2_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5165-2_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5164-5
Online ISBN: 978-1-4842-5165-2
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)