Simplify Identity and Access Management – Phase 2: Implement a Risk- and Role-Based Access Control Model

Author(s): Ian Mulholland, Sean Thurston

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Info-Tech offers a methodology for building a role-based access control model from scratch. This phase will take you through the following activities:

  • Create roles and assign permissions
  • Identify role constraints
  • Assign users to roles
  • Create risk thresholds
  • Define baseline metrics

Use this phase as part of the full blueprint Simplify Identity and Access Management.

Related Content

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019