As part of the Enduring Security Framework (ESF), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released Identity and Access Management Recommended Best Practices Guide for Administrators. These best practices provide system administrators with actionable recommendations to better secure their systems from Identity and Access Management (IAM) threats.
IAM, a framework of business processes, policies, and technologies that facilitate the management of digital identities, ensures that users only gain access to data when they have the appropriate credentials. The attached guide provides recommended best practices and mitigations to counter threats to IAM related to:
- Identity governance
- Environmental hardening
- Identity federation/single sign-on
- Multifactor authentication
- IAM auditing and monitoring
A CISA and NSA-led working panel with ESF developed and published this guidance. This public-private cross-sector partnership aims to address risks that threaten critical infrastructure and national security systems.
Link: Identity & Access Management Manual
Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@wapacklabs.com
Weekly Cyber Intelligence Briefings:
- Reporting: https://www. redskyalliance. org/
- Website: https://www. wapacklabs. com/
- LinkedIn: https://www. linkedin. com/company/64265941
Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/5504229295967742989
Comments