Axiomatics Bootcamp ABAC 101

This “bootcamp” style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises and government agencies are making the shift to ABAC to help tackle specific use cases – including compliance with privacy laws, enabling inter-government agency collaboration, reduction of data leakage, combating insider threat and information sharing to improve customer experience.

 

Key takeaways: 

  • ABAC definition and application to the APIs, application and database layers
  • Evolving from existing role-based access control
  • How the Axiomatics policy-based approach works
  • Seven steps to ABAC success
  • How to get started now

 

Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.