Role-based Access Control: Five steps to Effective Access Management
PATECCO GmbH
PATECCO is a German company, dedicated to development and implementation of Identity & Access Management solutions.
Defining and granting access rights is a constant challenge for IT departments. On the one hand, operational processes must not be disrupted by unnecessary restrictions, while on the other hand, it is essential to avoid overly broad rights and thus potential points of attack. The least privilege approach promises a balance between productivity and security. Its implementation in turn benefits sustainably from the implementation of role-based access control. If roles and associated authorisations are preconfigured, manual, error-prone system settings become obsolete.
What is Role-based Access Control (RBAC)?
Role-based access control is a procedure for managing and controlling access to files or services. Instead of giving users in the network direct access rights to various systems or making spontaneous decisions about who may access what and for how long, access is granted according to a role previously assigned to the user. In this way, RBAC supports the implementation and systematic enforcement of a least privilege strategy - even in large and geographically distributed companies, which is why the RBAC concept is often used in particular in companies with more than 500 employees. This ensures that employees always have the rights they need and that there are no business interruptions, while RBAC also eliminates overly broad rights and thus potential gateways for hackers and inside attackers.
Although the RBAC model has been in use for years, its consistent implementation is becoming increasingly difficult due to the complexity of modern use cases. The rapid increase in cloud services and third-party software makes a uniform approach to role-based access control indispensable, as this is the only way to effectively reduce risks and meet compliance requirements in the long term.
Five steps to RBAC
Effective implementation of role-based access control involves the following five steps:
In principle, IT departments should design role-based access control so flexibly that it is possible to define roles and their restrictions entirely according to individual requirements, wishes and prerequisites. This includes, in particular, limiting permissions based on a specific project, setting a time limit or expiry date, applying permissions based on geographical location or restricting permissions by time of day.
领英推荐
The challenge of overlapping role assignments
Many users are assigned more than one role, so the implications of overlapping role assignments must be considered and permissions defined for appropriate combinations. In cases where a user has multiple roles, an administrator must therefore configure how RBAC is applied so that potential conflicts between roles are addressed and the employee does not end up with more permissions than intended.
In doing so, RBAC essentially distinguishes between two types of separation of duty: static (Static Separation of Duty) and dynamic (Dynamic Separation of Duty). Mutually exclusive role restrictions are used to enforce static separation of duty policies, while dynamic separation is intended to restrict the permissions available to a user.
To further codify the assignment and inheritance of permissions, the National Institute of Standards and Technology (NIST) has established four levels that define groups: ?????????????????????
Conclusion
Role-based access control simplifies common IT administration tasks such as adding a new user, moving a person to another department or even deleting a user, thus reducing the burden on the IT department. When used systematically, RBAC reduces the risk of granting too much access to a user and thus promotes the implementation of a least-privilege strategy. With clearly defined roles, protocols are created specifying exactly which role is appropriate for which type of user, preventing inappropriate inheritance of permissions. In the event of a compromise, permissions can also be blocked extremely quickly and on a large scale, effectively preventing the spread of cyber attacks.