Oort Knowledge Base
search
⌘Ctrlk
Oort Knowledge Base
  • Home
  • Glossary
  • 📊Dashboard
  • 👥Understanding your users
  • 🗃️Applications
  • 💻Devices
  • robotNon-Human Identities (NHI)
  • 🧩Configuring Integrations
  • ☑️Understanding Check failures
  • ⚙️Tenant Settings
  • 🏥Identity Posture Score
  • 🚨User Trust Level
  • How-to Guides
  • Public API
  • Troubleshooting & Support
  • Best Practices
    • 🛣️What’s Next? How to use Identity Intelligence effectively
    • 📚Identity Security Reading List
    • ✍️KPIs for
 IAM Teams
  • Blogs
  • Release Notes
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Best Practices

📚Identity Security Reading List

Want to learn more about identity but don't know where to start? Here's some useful resources

CISA/NSA

Advancing Zero Trust Maturity Throughout the User Pillararrow-up-right

Identity and Access Management Recommended Best Practices for Administrators arrow-up-right

Microsoft Azure Active Directory M365 Minimum Viable Secure Configuration Baseline Draft Version 0.1arrow-up-right

Books

Access Control and Identity Management arrow-up-right

Authentication and Access Control arrow-up-right

Securing the Perimeter arrow-up-right

Identity Attack Vectors arrow-up-right

Identity Management: A Business Perspective arrow-up-right

Other

The Beer Drinker’s Guide to SAML | Duo Security arrow-up-right

Building an Identity Security Program | Oortarrow-up-right

Podcasts

Identity at the Center arrow-up-right

State of Identity arrow-up-right

The Week in Identity arrow-up-right

IDentity Today arrow-up-right

The Identity Jedi arrow-up-right

Didi and Lital Show arrow-up-right

Decipherarrow-up-right

PreviousWhat’s Next? How to use Identity Intelligence effectivelychevron-leftNextKPIs for
 IAM Teamschevron-right

Last updated 2 years ago