Design an identity security strategy
Learn how to design a cybersecurity strategy for identity management.
Learning objectives
Upon completion of this module, the learner will be able to:
- Recommend an identity store for security.
- Recommend secure authentication and security authorization strategies.
- Secure conditional access.
- Design a strategy for role assignment and delegation.
- Define Identity governance for access reviews and entitlement management.
- Design a security strategy for privileged role access to infrastructure.
- Design a security strategy for privileged access.
Prerequisites
- Conceptual knowledge of security policies, requirements, zero trust architecture, and management of hybrid environments.
- Working experience with zero trust strategies, applying security policies, and developing security requirements based on business goals.