Skip to main content
DI

Privacy & Compliance

Navigate the intersection of identity management and regulatory compliance. Covers GDPR, SOC 2, ISO 27001, NIST 800-63, privacy by design, consent management, and data protection impact assessments.

9 terms8 books

Key Terms

Identity Governance and Administration

IGA

A framework of policies, processes, and technologies that manage and govern digital identities and their access rights across an organization, including provisioning, certification, and compliance reporting.

intermediateGovernanceCompliance

Customer Identity and Access Management

Trending

CIAM

A specialized subset of IAM focused on managing and securing external customer identities, providing seamless registration, authentication, and profile management for consumer-facing applications.

intermediateAuthenticationPrivacy

Access Review

A periodic assessment process where managers or application owners review and validate that users' current access rights are appropriate and aligned with their roles and responsibilities.

beginnerGovernanceCompliance

Separation of Duties

SoD

A security control principle that divides critical tasks among multiple people or roles to prevent any single individual from having enough access to commit fraud or cause significant harm undetected.

intermediateGovernanceCompliance

Self-Sovereign Identity

SSI

An identity model that gives individuals full ownership and control of their digital identities without relying on any centralized authority, using decentralized identifiers and verifiable credentials.

advancedDecentralized IdentityPrivacy

SOC 2

A compliance framework developed by the AICPA that defines criteria for managing customer data based on five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.

intermediateComplianceGovernance

ISO 27001

An international standard for information security management systems (ISMS) that specifies requirements for establishing, implementing, maintaining, and continually improving an organization's information security posture.

intermediateComplianceGovernance

NIST 800-63

The NIST Digital Identity Guidelines that provide technical requirements and recommendations for digital identity services, defining Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL).

advancedComplianceStandards & Protocols

General Data Protection Regulation

GDPR

A comprehensive EU regulation on data protection and privacy that establishes rules for how organizations collect, process, store, and transfer personal data of EU residents, with significant penalties for non-compliance.

intermediateCompliancePrivacy

Recommended Books

NIST SP 800-63 Digital Identity Guidelines

Paul Grassi

NIST SP 800-63 Digital Identity Guidelines

Paul Grassi, James Fenton, Elaine Newton, Ray Perlner, Andrew Regenscheid

4.7

The NIST SP 800-63 Digital Identity Guidelines provide technical requirements for federal agencies implementing digital identity services. Revision 4 covers identity proofing (800-63A), authentication and lifecycle management (800-63B), and federation and assertions (800-63C). It defines Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL).

referenceComplianceIAM

The Data Privacy and GDPR Handbook

Sanjay Sharma

The Data Privacy and GDPR Handbook

Sanjay Sharma

4.2

A comprehensive handbook for data privacy professionals covering GDPR implementation, data protection impact assessments, consent management, data subject rights, breach notification procedures, and ongoing compliance management.

intermediatePrivacyCompliance

Strategic Privacy by Design

R. Jason Cronk

Strategic Privacy by Design

R. Jason Cronk

4

This book provides a methodology for embedding privacy into systems and processes from the ground up. It covers privacy engineering frameworks, threat modeling for privacy, data minimization strategies, and building privacy-respecting identity systems.

advancedPrivacyCompliance

EU GDPR: A Pocket Guide

Alan Calder

EU GDPR: A Pocket Guide

Alan Calder

4

A concise, accessible guide to the EU General Data Protection Regulation. It covers the key requirements, principles, and obligations for organizations handling EU personal data, making it an ideal quick reference.

beginnerPrivacyCompliance

Self-Sovereign Identity

Alex Preukschat

Self-Sovereign Identity

Alex Preukschat, Drummond Reed

4.3

Self-Sovereign Identity provides a comprehensive overview of decentralized identity concepts including verifiable credentials, decentralized identifiers (DIDs), and the trust-over-IP stack. It explores how SSI can transform digital identity by giving individuals control over their own identity data.

advancedDecentralized IdentityPrivacy

Enterprise IAM Guidebook

Jeff Lombardo

Enterprise IAM Guidebook

Jeff Lombardo

4.1

A practical guide to building and maturing an enterprise IAM program. Covers program strategy, technology selection, role management, access governance, compliance, and organizational change management for IAM.

intermediateIAMIdentity Governance