Back to Videos

#5 | The Need for Role Based Access Control | Certification

November 9, 2017


Video Description

Share to:

The common audit violations within an enterprise or organization are: 

Excessive Access given to users 

Segregation of Duty Violations 


In this 5 part demo series we will look into the need of Role Based Access Control (RBAC) as well as implementing the solution (IBM Security Identity and Governance Intelligence). 


In the previous episode "Provisioning" we saw that Allan Wake (awake) had all the required accounts and permissions provisioned to him, however in this episode he would need to request an additional role which was not assigned to him originally. We will guide you on how "awake" can request this role as well as the responsibilities of a Risk Manager and User Manager in this scenario.




Copyright Ⓒ 2024 IAMTEAM. All Rights Reserved.