Security Role Management Best Practices

Поділитися
Вставка
  • Опубліковано 8 лип 2024
  • IBM Security Verify Governance → ibm.biz/Security_Verify_Gover...
    Too many of today's organizations treat access control management to their applications as an endless list of one-off entitlements. It's not by design, but it just becomes that way over time. What if you could simplify your company's application access as a manageable list of business roles rather than thousands of unique user entitlements? In this video, security expert Jeff Crume explains a multi-tier approach to role management, leading to controls that are easier to understand and manage while also improving security.
    #AI #Software #RoleManagement #JeffCrume #DataSecurity #lightboard #IBM
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now

КОМЕНТАРІ • 8

  • @KaraWadeBrown
    @KaraWadeBrown Рік тому +1

    Company’s pay 40,000 dollars for the amount of money saved in the long run a huge consulting idea like that would save so much money and time :) really your a natural. Are you a consultant for ibm?

    • @jeffcrume
      @jeffcrume Рік тому

      I actually work in technical sales but my job involves a certain degree of high level consulting

  • @nelsonmacy1010
    @nelsonmacy1010 Рік тому +1

    Outstanding. Very good design

  • @shin-jo2801
    @shin-jo2801 Рік тому +1

    this reminds me of database normalization for some reason. Great frikkin content IBM

  • @KaraWadeBrown
    @KaraWadeBrown Рік тому +1

    You made a solid impression:) i couldn’t be more gratified, great job

    • @jeffcrume
      @jeffcrume Рік тому

      Thanks so much for the kind complements!

  • @benjamine.ndugga729
    @benjamine.ndugga729 Рік тому +2

    Each Role should be given entitlements but in a scenario where you have multiple roles assigned to a user, those entitlements should not be duplicated...

  • @TheAshsonu
    @TheAshsonu Рік тому

    This seems fairly close to RBAC in k8s, in RBAC roles are bucket of capabilities and rolebindings are rules which allows users to be linked to these roles.