Oort Knowledge Base
search
Ctrlk
  • Home
  • Glossary
  • 📊Dashboardchevron-right
  • 👥Understanding your userschevron-right
  • 🗃️Applications
  • 💻Devices
  • robotNon-Human Identities (NHI)
  • 🧩Configuring Integrationschevron-right
  • ☑️Understanding Check failureschevron-right
  • ⚙️Tenant Settingschevron-right
  • 🏥Identity Posture Score
  • 🚨User Trust Level
  • How-to Guideschevron-right
  • Public APIchevron-right
  • Troubleshooting & Supportchevron-right
  • Best Practiceschevron-right
    • 🛣️What’s Next? How to use Identity Intelligence effectively
    • 📚Identity Security Reading List
    • ✍️KPIs for
 IAM Teams
  • Blogschevron-right
  • Release Noteschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Best Practices

📚Identity Security Reading List

Want to learn more about identity but don't know where to start? Here's some useful resources

CISA/NSA

Advancing Zero Trust Maturity Throughout the User Pillararrow-up-right

Identity and Access Management Recommended Best Practices for Administrators arrow-up-right

Microsoft Azure Active Directory M365 Minimum Viable Secure Configuration Baseline Draft Version 0.1arrow-up-right

Books

Access Control and Identity Management arrow-up-right

Authentication and Access Control arrow-up-right

Securing the Perimeter arrow-up-right

Identity Attack Vectors arrow-up-right

Identity Management: A Business Perspective arrow-up-right

Other

The Beer Drinker’s Guide to SAML | Duo Security arrow-up-right

Building an Identity Security Program | Oortarrow-up-right

Podcasts

Identity at the Center arrow-up-right

State of Identity arrow-up-right

The Week in Identity arrow-up-right

IDentity Today arrow-up-right

The Identity Jedi arrow-up-right

Didi and Lital Show arrow-up-right

Decipherarrow-up-right

PreviousWhat’s Next? How to use Identity Intelligence effectivelychevron-leftNextKPIs for
 IAM Teamschevron-right

Last updated 2 years ago