Oort Knowledge Base
CtrlK
  • Home
  • Glossary
  • 📊Dashboard
  • 👥Understanding your users
  • 🗃️Applications
  • 💻Devices
  • Non-Human Identities (NHI)
  • 🧩Configuring Integrations
  • ☑️Understanding Check failures
  • ⚙️Tenant Settings
  • 🏥Identity Posture Score
  • 🚨User Trust Level
  • How-to Guides
  • Public API
  • Troubleshooting & Support
  • Best Practices
    • 🛣️What’s Next? How to use Identity Intelligence effectively
    • 📚Identity Security Reading List
    • ✍️KPIs for
 IAM Teams
  • Blogs
  • Release Notes
Powered by GitBook
On this page
  1. Best Practices

📚Identity Security Reading List

Want to learn more about identity but don't know where to start? Here's some useful resources

CISA/NSA

Advancing Zero Trust Maturity Throughout the User Pillar

Identity and Access Management Recommended Best Practices for Administrators

Microsoft Azure Active Directory M365 Minimum Viable Secure Configuration Baseline Draft Version 0.1

Books

Access Control and Identity Management

Authentication and Access Control

Securing the Perimeter

Identity Attack Vectors

Identity Management: A Business Perspective

Other

The Beer Drinker’s Guide to SAML | Duo Security

Building an Identity Security Program | Oort

Podcasts

Identity at the Center

State of Identity

The Week in Identity

IDentity Today

The Identity Jedi

Didi and Lital Show

Decipher

PreviousWhat’s Next? How to use Identity Intelligence effectivelyNextKPIs for
 IAM Teams

Last updated 2 years ago