Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Pillars of a good security culture


Now that we have highlighted the need for a security culture, let's look at its four main components. As we have already mentioned in the introduction, we will discuss the following four areas, which are the cornerstone of a healthy and sustainable security culture:

  • Leadership support
  • Training
  • Testing
  • Continuous communication

 

 

You will get an overview and tips that will help to you install a high-quality security culture in your organization. Keep in mind that an organization's security culture is the foundation of any security control and should be supported by an information-protection strategy. In the next part of this section, we will start with the leadership support you need to support an information-protection strategy.

Leadership support

An information-protection strategy and the associated security culture always has to start with the top-level executives and board members. This will provide the funding for appropriate resources to develop, implement...