+

Toxic Pairs, Role Explosion, and the Evolution of RBAC

A Practical Guide for Fine-Grained Access Control

It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is no stranger to these complexities. Managing access control and entitlements has become an impossible task where role-based access control has failed us leaving behind a difficult trail of toxic combinations and role explosions: an administrator’s worst nightmare.

But help is on the way. Using next generation Attribute Based Access Control (ABAC) based on attributes and policies can help solve the enterprise’s most challenging access control issues.

In this webinar, Security Architects expert Dan Beckett and Axiomatics sleuth David Brossard solve these seemingly impossible authorization mysteries.
You’ll learn about toxic combinations, role explosion and how ABAC can help. 

 

Other Resources

Webinars
Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.