Simplify Identity and Access Management – Phase 2: Implement a Risk- and Role-Based Access Control Model

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Info-Tech offers a methodology for building a role-based access control model from scratch. This phase will take you through the following activities:

  • Create roles and assign permissions
  • Identify role constraints
  • Assign users to roles
  • Create risk thresholds
  • Define baseline metrics

Use this phase as part of the full blueprint Simplify Identity and Access Management.

View the Complete Blueprint:

Simplify Identity and Access Management

Leverage risk- and role-based access control to quantify and simplify the IAM process.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019