Tag

access management

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Mar 28, 2024 · Information Security

Unlocking Organizational Security: New Identity Governance Maturity Model Standards

Amid growing organizational complexity and rising security incidents, the China Academy of Information and Communications Technology and leading enterprises have launched the Identity Governance Capability Maturity Model series standards—detailing evaluation frameworks, levels, and processes—to help organizations assess and improve identity governance, with open registration for 2024 assessments.

access managementevaluation processidentity governance
0 likes · 6 min read
Unlocking Organizational Security: New Identity Governance Maturity Model Standards
Ops Development Stories
Ops Development Stories
Apr 22, 2019 · Information Security

How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them

This article explains the MAC learning and aging processes, demonstrates MAC flooding and ARP spoofing attacks with practical test setups, and provides step‑by‑step configurations such as port security, access management, and DHCP snooping to protect network switches from these threats.

ARP spoofingDHCP snoopingMAC flooding
0 likes · 10 min read
How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them
Beike Product & Technology
Beike Product & Technology
Sep 30, 2017 · Information Security

Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM

The article describes the challenges of resource isolation and permission management in a microservice environment, explains AWS IAM concepts and policies, and details the design, development, and expected benefits of the internally built OpenIAM service for unified authentication and authorization across services.

AWSIAMOpenIAM
0 likes · 9 min read
Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM