Back to Videos

#2 | The Need for Role Based Access Control | Analysis

October 17, 2017


Video Description

Share to:

The common audit violations within an enterprise or organization are: 

Excessive Access given to users 

Segregation of Duty Violations 


In this 5 part demo series we will look into the need of Role Based Access Control (RBAC) as well as implementing the solution (IBM Security Identity and Governance Intelligence). In this episode we Analyze the relationships between permissions and users and look into these relationships in order to define potential role candidates.


Copyright Ⓒ 2024 IAMTEAM. All Rights Reserved.