The Zero Trust Framework and Privileged Access Management (PAM)

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.

Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.

However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.

1144316785
The Zero Trust Framework and Privileged Access Management (PAM)

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.

Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.

However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.

42.99 In Stock
The Zero Trust Framework and Privileged Access Management (PAM)

The Zero Trust Framework and Privileged Access Management (PAM)

by Ravindra Das
The Zero Trust Framework and Privileged Access Management (PAM)

The Zero Trust Framework and Privileged Access Management (PAM)

by Ravindra Das

eBook

$42.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.

Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.

However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.


Product Details

ISBN-13: 9781040018705
Publisher: CRC Press
Publication date: 05/02/2024
Sold by: Barnes & Noble
Format: eBook
Pages: 125
File size: 1 MB

About the Author

Ravindra Das is a technical writer in the field of Cybersecurity. He also does Cybersecurity consulting on the side, through his private practice, RaviDas.Tech, Inc. He also holds a Cybersecurity certification from the ISC(2) and other key certifications from Microsoft, CyberArk, and Barracuda Networks.

Table of Contents

1. Introduction. 2. The Zero Trust Framework: The Origins of the Zero Trust Framework. 3. The Components of Privileged Access Management: What Exactly Is PAM?. 4. The Passwordless Society: Introduction.

From the B&N Reads Blog

Customer Reviews