Go to content
UR Home

IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence

URN to cite this document:
urn:nbn:de:bvb:355-epub-586583
DOI to cite this document:
10.5283/epub.58658
Puchta, Alexander ; Baumer, Thomas ; Müller, Mathis ; Pernul, Günther
[img]PDF - Accepted Version
frei zugänglich ab 15.7.25
(363kB)
Date of publication of this fulltext: 18 Jul 2024 06:44



Abstract

Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...

plus


Owner only: item control page
  1. Homepage UR

University Library

Publication Server

Contact:

Publishing: oa@ur.de
0941 943 -4239 or -69394

Dissertations: dissertationen@ur.de
0941 943 -3904

Research data: datahub@ur.de
0941 943 -5707

Contact persons