IAM Guidelines

11004182894?profile=RESIZE_400xAs part of the Enduring Security Framework (ESF), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released Identity and Access Management Recommended Best Practices Guide for Administrators.  These best practices provide system administrators with actionable recommendations to better secure their systems from Identity and Access Management (IAM) threats.

IAM, a framework of business processes, policies, and technologies that facilitate the management of digital identities, ensures that users only gain access to data when they have the appropriate credentials.  The attached guide provides recommended best practices and mitigations to counter threats to IAM related to:

  • Identity governance
  • Environmental hardening
  • Identity federation/single sign-on
  • Multifactor authentication
  • IAM auditing and monitoring

A CISA and NSA-led working panel with ESF developed and published this guidance. This public-private cross-sector partnership aims to address risks that threaten critical infrastructure and national security systems.

 Link: Identity & Access Management Manual

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@wapacklabs.com             

Weekly Cyber Intelligence Briefings:

  • Reporting: https://www. redskyalliance. org/   
  • Website: https://www. wapacklabs. com/  
  • LinkedIn: https://www. linkedin. com/company/64265941   

Weekly Cyber Intelligence Briefings: 

REDSHORTS - Weekly Cyber Intelligence Briefings

https://attendee.gotowebinar.com/register/5504229295967742989  

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!