Role Based Access Control (RBAC) As An Access Control

824 Words2 Pages

In this article, the author discusses the benefits of employing Role Based Access Control (RBAC) as an Access Control. Galante makes many valid points and has demonstrated how using RBAC has many benefits to an organization. A few cases differentiate RBAC and the simple access control model. Although the author suggest RBAC as an optimal solution; RBAC certainly isn 't a cure all, however, it is ideal for a variety of circumstances. When RBAC is deployed properly and in the ideal situation, it can compensate the organization with financial, security and responsibility benefits.
The three principle components of access control in a trusted computer system infrastructure are:
• Authority: Security policies, relevant security information, and …show more content…

Notwithstanding following along, RBAC effectively oversees resource management. The author contends, however great RBAC appears to be, it is not suitable for every organization, nor will every organization reap benefits from it. That being said, RBAC is not a universal solution, nor should it be treated as such; “RBAC generally does not add value in small operations” Galante (2009), in such situations, the extreme organization can cause more harm than good. Generally, organizations with high turnover and/or lots of structure, people, roles, and resources are good RBAC candidates. In other words, RBAC is well suited to large, unstable, organized, or secure …show more content…

If well managed, it provides three main advantages: saves money, reduces risk, and increases accountability and control. How Does RBAC Reduce Risk?
RBAC’s most important contribution, risk reduction, is accomplished through three standard security control actions: preventive, detective and corrective.
1. Prevents violations by limiting resource access to persons with a verified need to know.
2. Risk reduction occurs by audit trails aiding in the detection of security

More about Role Based Access Control (RBAC) As An Access Control

Open Document