Attribute Based Access Control (ABAC) Authorizing Data Access

This is a joint webinar together with our partner First Point Global.
In this webinar we will demonstrate how dynamic authorisation supports innovation in the digital economy

With the explosive growth of social media, mobile, big data and cloud, business is under pressure to deliver consumer/customer/citizen-centric applications that are available anytime, anywhere, and from any device. Customers have choice. Services must be easy to use and relevant, and trust has to be established through respecting a person’s permission, preferences and privacy. To win in the digital economy, participants must continually “earn” their clients’ identity, ongoing engagement and loyalty.

Attribute Based Access Control enables “business or context” aware authorisation decisions, which adds a degree of business agility and client relevance that is simply impossible under the rigid Role Based Access Control (RBAC) authorisation model.

If you wish to play a lead role in the digital economy, and you are a data or security architect designing consumer/customer/citizen-facing applications and services, this webinar will present a number of valuable use cases which are driving competitive advantage and time to value in innovative companies today.

There will be a general introduction to ABAC along with a number of use cases that exemplify its application as a business enabler for the digital economy including:

  • the business value of ABAC
  • ABAC use cases for context aware information management
  • ABAC database filtering, the key to unlocking identity aware legacy data
  • the role of ABAC in a modern information security strategy


Other Resources

The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.