Security Role Management Best Practices
Вставка
- Опубліковано 8 лип 2024
- IBM Security Verify Governance → ibm.biz/Security_Verify_Gover...
Too many of today's organizations treat access control management to their applications as an endless list of one-off entitlements. It's not by design, but it just becomes that way over time. What if you could simplify your company's application access as a manageable list of business roles rather than thousands of unique user entitlements? In this video, security expert Jeff Crume explains a multi-tier approach to role management, leading to controls that are easier to understand and manage while also improving security.
#AI #Software #RoleManagement #JeffCrume #DataSecurity #lightboard #IBM
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
Company’s pay 40,000 dollars for the amount of money saved in the long run a huge consulting idea like that would save so much money and time :) really your a natural. Are you a consultant for ibm?
I actually work in technical sales but my job involves a certain degree of high level consulting
Outstanding. Very good design
this reminds me of database normalization for some reason. Great frikkin content IBM
You made a solid impression:) i couldn’t be more gratified, great job
Thanks so much for the kind complements!
Each Role should be given entitlements but in a scenario where you have multiple roles assigned to a user, those entitlements should not be duplicated...
This seems fairly close to RBAC in k8s, in RBAC roles are bucket of capabilities and rolebindings are rules which allows users to be linked to these roles.