Simplify Identity and Access Management – Phase 2: Implement a Risk- and Role-Based Access Control Model

Author(s): Ian Mulholland, Sean Thurston

Info-Tech offers a methodology for building a role-based access control model from scratch. This phase will take you through the following activities:

  • Create roles and assign permissions
  • Identify role constraints
  • Assign users to roles
  • Create risk thresholds
  • Define baseline metrics

Use this phase as part of the full blueprint Simplify Identity and Access Management.