As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should actually be denied. For example, the same person entering a trade should not be allowed to confirm it as well, as this can lead to fraud or that employees in certain lines of business should not be allowed to access specific applications.
A policy-based access control approach that uses attributes to build policies is an intelligent – and scalable – way to overcome this potential compliance nightmare.
- Overview of toxic combinations and Segregation of Duties
- Introduction to attribute and policy-based access control
- Guidelines to simplicity of set-up, and working intuitively within this framework
- Policy modeling hands-on workshop