Identity Security

Identity Security
Progress0/26 (0%)

Protect identities from threats through detection, response, and proactive security measures.

01

Identity Threat Detection

Detect and respond to identity-based attacks and anomalies.

02

Credential Protection

Protect credentials from theft, exposure, and misuse.

03

Account Takeover Prevention

Prevent and detect unauthorized access to user accounts.

04

Identity Infrastructure Security

Secure the identity infrastructure including directories and identity providers.

05

Fraud Detection

Detect fraudulent identity activities and prevent financial losses.

06

Zero Trust Architecture

Implement Zero Trust principles for identity-centric security.

07

Security Posture Assessment

Assess and improve identity security posture continuously.

08

Incident Response for Identity

Respond to identity-related security incidents effectively.

09

Identity Proofing

Verify that users are who they claim to be during onboarding.

10

Privacy and Data Protection

Protect identity data and ensure privacy compliance.

11

Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response ITDR refers to the proactive monitoring, detection, and response to identity-related security threats and incidents within an...

12

Security Information and Event Management (SIEM)

Security Information and Event Management SIEM is a comprehensive solution that aggregates and analyzes log data generated throughout an organization's technology...

13

Zero Trust

Zero Trust, also known as Zero Trust Architecture ZTA , Zero Trust Strategy or Zero Trust Security Model, is a new security paradigm that challenges the conventional wisdom of...

14

Zero Trust Network Access (ZTNA)

Zero Trust Network Access ZTNA is a specific implementation of the Zero Trust /identity-security/zero-trust principles, primarily focused on securing network access. While Zero...

15

ISPM (Identity Security Posture Management)

Identity Security Posture Management ISPM is a security discipline focused on continuously assessing, monitoring, and improving an organization's identity security posture...

16

OWASP Cheat Sheet Series

The OWASP Cheat Sheet Series is a comprehensive collection of high-value security guidance documents created and maintained by the Open Web Application Security Project OWASP...

17

Security Orchestration Automation and Response (SOAR)

Security Orchestration, Automation, and Response SOAR is a cybersecurity solution designed to streamline and optimize security operations by integrating the management of...

18

Verifiable Credentials (VCs)

Verifiable Credentials VCs are integral to the paradigm shift toward Self-Sovereign Identity SSI /identity-security/ssi , a decentralized identity model placing individuals in...

19

Decentralized Identifier (DID)

Decentralized Identifiers DIDs are globally unique identifiers for verifiable, self-sovereign digital identities /identity-security/ssi . Unlike traditional identities managed...

20

Post-Quantum Cryptography (PQC)

Post-Quantum Cryptography, in IAM context sometimes referred to as Quantum-Safe Authentication, represents the next generation of cryptographic algorithms designed to withstand...

21

Self-Sovereign Identity (SSI)

Self-sovereign identity SSI is a concept that puts individuals in control of their own digital identities without relying on a central authority. In traditional identity...

22

Continuous Access Evaluation (CAE): Real-Time Token Revocation

Revoke access mid-session by reacting to risk changes (disable, reset, device risk, etc.).

23

Identity Threat Detection & Response (ITDR)

Detect and respond to identity attacks: consent phishing, token theft, MFA bypass, and privilege escalation.

24

Non-Human Identity (NHI) Governance

Inventory, control, and rotate service accounts, API keys, and automation credentials.

25

Device Posture + Conditional Access

Turn device compliance signals into policy decisions without breaking productivity.

26

OAuth Consent and Consent Phishing

How attackers abuse OAuth grants and how to harden scopes, publishers, and monitoring.