The Official (ISC)2 Guide to the CISSP CBK ReferenceWarsinske, J., Graff, M., Henry, K., Hoover, C., Malisow, B., Murphy, S., Oakes, C.P., Pajari, G., Parker, J.T., Seidl, D., & Vasquez, M. (2019). The official (ISC) 2 guide to the CISSP CBK Reference (5th ed.). Wiley.
Read Chapter 5 - Domain 5: Identity and Access Management.
This chapter details the fundamental aspects of Identity and Access Management (IAM), which determines who gets access to what assets based on location, length of time, and having a specific purpose.