Conclusion

  • Haber M
  • Rolls D
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Identity attacks cannot be prevented or solved with any single technology, tool, or technique. There is no pinch-hit quick solution. Identity and access management is an ongoing process that invariably must become a critical part of how you manage security for your infrastructure. Best practice IAM must be adopted as a part of the company culture and comprehensively implemented as part of a continuous management approach to the multiple changes, threats, and risks within your environment. In practice, this is a process that never stops since your business never stops.

Cite

CITATION STYLE

APA

Haber, M. J., & Rolls, D. (2020). Conclusion. In Identity Attack Vectors (pp. 189–192). Apress. https://doi.org/10.1007/978-1-4842-5165-2_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free