Info-Tech offers a methodology for building a role-based access control model from scratch. This phase will take you through the following activities:

  • Create roles and assign permissions
  • Identify role constraints
  • Assign users to roles
  • Create risk thresholds
  • Define baseline metrics

Use this phase as part of the full blueprint Simplify Identity and Access Management.

Also In

Simplify Identity and Access Management

Leverage risk- and role-based access control to quantify and simplify the IAM process.


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.