Back to Videos

#2 | The Need for Role Based Access Control | Analysis

October 17, 2017

IAMTEAM

Video Description

Share to:

The common audit violations within an enterprise or organization are: 

Excessive Access given to users 

Segregation of Duty Violations 

 

In this 5 part demo series we will look into the need of Role Based Access Control (RBAC) as well as implementing the solution (IBM Security Identity and Governance Intelligence). In this episode we Analyze the relationships between permissions and users and look into these relationships in order to define potential role candidates.

IAMTEAM logo
social-media-1social-media-2social-media-3social-media-5

Copyright Ⓒ 2024 IAMTEAM. All Rights Reserved.