Making role management work

Many IT security professionals still regard role-based access and identity management as hopelessly complex because the predominantly manual approach used to review and manage roles is not scalable and because of the dynamic nature of jobs, roles often get out of sync with reality. There are three k...

Full description

Saved in:
Bibliographic Details
Published inNetwork World Vol. 25; no. 37; p. 28
Main Author Taneja, Deepak
Format Trade Publication Article
LanguageEnglish
Published Southborough Foundry 22.09.2008
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Many IT security professionals still regard role-based access and identity management as hopelessly complex because the predominantly manual approach used to review and manage roles is not scalable and because of the dynamic nature of jobs, roles often get out of sync with reality. There are three key objectives to determining the success of any roles-based access and identity management initiative: 1. The people who manage roles should understand them. 2. Roles should simplify users' view of access. 3. Roles should make the management of access more effective. Some of the best way to accomplish these objectives and establish the best role set for your organization is to: 1. Examine the results. 2. Establish ownership. 3. Keep it simple.
ISSN:0887-7661