Making role management work
Many IT security professionals still regard role-based access and identity management as hopelessly complex because the predominantly manual approach used to review and manage roles is not scalable and because of the dynamic nature of jobs, roles often get out of sync with reality. There are three k...
Saved in:
Published in | Network World Vol. 25; no. 37; p. 28 |
---|---|
Main Author | |
Format | Trade Publication Article |
Language | English |
Published |
Southborough
Foundry
22.09.2008
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Many IT security professionals still regard role-based access and identity management as hopelessly complex because the predominantly manual approach used to review and manage roles is not scalable and because of the dynamic nature of jobs, roles often get out of sync with reality. There are three key objectives to determining the success of any roles-based access and identity management initiative: 1. The people who manage roles should understand them. 2. Roles should simplify users' view of access. 3. Roles should make the management of access more effective. Some of the best way to accomplish these objectives and establish the best role set for your organization is to: 1. Examine the results. 2. Establish ownership. 3. Keep it simple. |
---|---|
ISSN: | 0887-7661 |