+

Four Role-based Access Control (RBAC) Limitations and How to Fix Them

Adopting attributed-based access control (ABAC) enables enterprises to extend existing roles using attributes and policies

CHICAGO, IL – September 23, 2021 – In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and microservices. Additionally, the amount of data created and consumed by these users, devices and services continues to explode, creating extraordinary security and compliance challenges.

Formalized by NIST in 1992, role-based access control (RBAC) has long been a standard approach to managing access to critical assets and data, particularly for enterprises managing more than 500 employees. However, to ensure secure access, enterprises can no longer afford to define authorization policies based solely on a user’s role.

Axiomatics, the originator and leading provider of runtime dynamic authorization solutions, has identified four limitations to an RBAC-centric security approach and suggests enterprises evolve their RBAC model to an attribute-based access control (ABAC) model. ABAC is recognized by NIST as a model that can “improve information sharing within organizations and between organizations while maintaining control of that information,” and is at the core of modern security approaches, including Zero Trust.

Four RBAC limitations

Role Explosion: RBAC is limited to defining access permissions by role, however, as each user often requires entirely unique access rights, one user may be assigned several roles, creating a ‘one size fits all’ solution that can result in too much (or too little) access. This also makes enterprises vulnerable to an exponential rise in roles versus users.

Toxic Combinations: Various roles assigned to a given user could contain conflicting data (i.e., someone is assigned a role allowing them to create a purchase order and another allowing them to approve the same order). This poses a significant business risk if not managed properly.

Management Nightmares: With an exponential growth of both users and roles, role engineering is a challenge. Administrators must constantly be aware of changes to both users and roles to ensure role assignment combinations are current, accurate and do not conflict with other roles a user is assigned.

No Context: RBAC was designed to be static, meaning it does not model policies that depend on contextual details including time of day, location, relationship between users, relationship between users and resources, etc. It was designed to address user access based on assigned role. Expanding user populations (including partners, consumers, regulators and auditors) and multi-role users requires authorization based on a finer level of information.

ABAC is the future of access control

Roles are still – and always will be – an integral part of a successful access control strategy, but to address critical enterprise needs (complex regulatory requirements, scalability, remote workforces) these roles must be extended using attributes and policies derived through ABAC.

ABAC adds context, ensuring authorization decisions can be made not only on a user’s role, but also by considering who or what that user is related to, what that user needs access to, where that user needs access from, when that user needs access, and how that user is accessing the requested information.

The Axiomatics Application Authorization Platform is the most complete platform available for enterprise-wide roll out of ABAC and to begin the transition from a role-based system to one that addresses the pressing need for policies be governed by fine-grain access controls available through attributes. Leveraging this platform, enterprises can roll access to applications under a single point of policy-based management, enabling scalability, visibility and control.

Supporting quote

Dr. Srijith Nair, Chief Strategy Officer, Axiomatics:

“Whether it’s Zero Trust or another approach, more enterprises understand that a modern workforce requires a modern approach to security, which means evolving beyond RBAC. Modern data sharing and collaboration scenarios must provide access to the right user, at the right time, in the right location, and by meeting regulatory compliance. By evolving RBAC with ABAC, administrators provide well-rounded access control that builds on RBAC while harnessing ABAC’s context to address today’s requirements and future needs.”

Supporting resources

White paper: Evolving RBAC to ABAC
Solution info: Axiomatics Application Authorization Platform
Fact sheet: Five ways to get started with Dynamic Authorization

About Axiomatics

Axiomatics is the originator and leading provider of runtime, fine-grained dynamic authorization delivered with Attribute Based Access Control (ABAC) for applications, data, APIs and microservices. The world’s largest enterprises and government agencies use Axiomatics Dynamic Authorization Suite to enable digital transformation, share and safeguard sensitive information, meet compliance requirements and minimize data fraud. Our innovative solutions enable enterprises to share sensitive, valuable and regulated digital assets – but only to authorized users and in the right context. To learn more, please visit https://www.axiomatics.com or follow us on Twitter @axiomatics.

Media Contact

Kelly O’Dwyer-Manuel
Senior Director, Marketing Communications
Axiomatics
[email protected]

Other News

Press Release
Axiomatics Awarded ISO 9001 and ISO 27001 Certifications
Certifications validate the company’s commitment to secure, high-quality handling and delivery of products and services CHICAGO – 13 September 2021 – Axiomatics, the leader in...
Press Release
Axiomatics Debuts New MuleSoft Certified Connector
Connector enables enterprises to eliminate custom coding of security rules, speeding time-to-market
Press Release
Axiomatics Expands Executive Leadership to Accelerate Growth
Stockholm May 11, 2021 – Axiomatics has appointed Jim Barkdoll as president and chief commercial officer.  A data security veteran with a long, successful track record.