

In other words, one role can hold many others inside it. For example, someone with the role "surgeon" might also work as a "doctor" or "radiograph interpreter." A role hierarchy defines one type of person who holds the attributes of many other people. Roles can also have overlapping responsibilities and privileges. It’s important to tailor access accordingly. A skilled worker can be trusted to work within sensitive documents without errors, while a novice could make catastrophic mistakes.

A board member and a CEO might hold similar authority within a company, but they are each responsible for different core functions. Senior management needs access to files interns should never see. Otherwise, large groups of people within your company can't do their work. Roles dictate authorization within an RBAC system. Since then, thousands of companies have applied RBAC concepts to manage security for their most sensitive documents. The new method, they argued, worked better in non-military, civilian settings. The originators felt that mandatory access controls and discretionary access controls just didn't work well for private companies and civilians because specific needs and security requirements varied so much. In 1992, RBAC concepts were introduced in a national computer security conference. RBAC systems have been around for decades. Promotions involve changing roles, not editing permissions as line items. A new job function becomes a new role applied to dozens (or hundreds or thousands) of employees with only a small amount of work for the administrator. This makes it easy to manage permissions. Access is defined by a person's role, not that person's preferences or wishes.

Workers are grouped together based on the tasks they perform. They identify roles, grant permissions, and otherwise maintain security systems. What Exactly Is Role-Based Access Control?Īll role-based access control systems share core elements, such as: Chances are, you'll either need to apply RBAC or explain why you think it's a bad idea for your company. In 2004, the American National Standards Institute adopted RBAC principles as an industry consensus standard. If you work in IT, understanding the ins and outs of role-based access control is critical. You can make these changes quickly by altering access by role. Make changes based on a person's role rather than individual attributes. Use this method to grant access to those who need it while blocking those who don't need access. Leave them open, and catastrophic security issues can arise. Protect them too strictly, and your company's work grinds to a halt. Why Does a System Need RBAC?Įvery company has sensitive documents, programs, and records. Those who hold different roles have different rights. Everyone who holds that role has the same set of rights. Role-based access control (RBAC) systems assign access and actions according to a person's role within the system.
