Building Love and Compatibility between RBAC and ABAC

As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of access control: Attribute Based Access Control (also known as “ABAC”). Some experts say these two models are at odds, and to move properly, enterprises need to “rip and replace” to a whole new way of controlling access. We disagree.

In most businesses, an evolution toward ABAC is the desired goal and the transition can be done over time. Join this webinar to understand the “love” that exists between RBAC and ABAC – and how to successfully make the shift to ABAC while extending and enhancing the value from your current system.

In this video, you will learn:

  • The basics of Attribute Based Access Control (or “ABAC”) and why it’s the solution for complex environments
  • What it means to transition a role-based  (or “RBAC “) model
  • How to get started
  • Sample use cases and examples

Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.