Info-Tech offers a methodology for building a role-based access control model from scratch. This phase will take you through the following activities:
- Create roles and assign permissions
- Identify role constraints
- Assign users to roles
- Create risk thresholds
- Define baseline metrics
Use this phase as part of the full blueprint Simplify Identity and Access Management.