|
Identity Attack Vectors : Strategically Designing and Implementing Identity Security, Second Edition
“... role-based identity assignments, entitlements, and auditing strategies can be used to mitigate...”