How to do Role Mining in Identity and Access management: Cybersecurity learning!

Поділитися
Вставка
  • Опубліковано 14 жов 2024
  • Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control. Two common approaches are top-down and bottom-up analysis.
    In an earlier video, we touched on the top-down analysis for how to identify roles by talking to particular department leads, conducting interviews, and even job shadowing to understand what access is granted.
    In this video, we will dive into bottom-up analysis where the approach is data-driven by using customer data. Using information such as an entity-relationship diagram (ERD) to understand how the customer database is set up. The end result is creating a story around the data to fully understand the make-up of a user, their access, and how access is granted.
    Leave a comment below on your thoughts and your own experiences.
    Resources:
    www.lucidchart...
    Learn SQL for beginners: • Learn Basic SQL in 15 ...
    Follow Andrew on Social media:
    Twitter: / allthingsiam
    Website: Coming soon!!
    My other appearances:
    CSNP IAM 101: • Identity and Access Ma...
    Active Listening: • Sit Down, Shut Up, and...
    Talking IAM with StudioSec: • Andrew Chanthaphone, F...
    Security Happy Hour with CyberWarrior Studios: • Security Happy Hour: I...
    ✔ Subscribe for more videos on Identity and Access Management:
    / @allthingsiam
    Feel free to leave a comment on suggested topics you want for me to discuss in future videos.
    Equipment Used:
    Camera: Logitech Brio Webcam
    Video Editing: Camtasia 2021
    Click here for a free trial: techsmith.z6rj...
    Images and videos provided by Canva
    Try it for free: bit.ly/3Eaq0B0
    Music Epidemic Sound
    Try it for free: bit.ly/2VM6rxK
    Disclaimer: Links included in this description might be affiliate links. If you purchase a product or service with the links, I provide I may receive a small commission. There is no additional charge to you! Thank you for supporting my channel, so I can continue to provide you with free content!

КОМЕНТАРІ • 7

  • @craigheard2504
    @craigheard2504 Рік тому

    Andrew. Thanks so much. Great explanation and information.

  • @soundsoflove
    @soundsoflove 2 роки тому +1

    Great videos! Very informative and straight to the point.

    • @AllThingsIAM
      @AllThingsIAM  2 роки тому

      Thank you for the comments, means a lot to me. Let me know if you have any topics you want me to cover, I'll try and get a future video for it.

  • @emmanuelb.2151
    @emmanuelb.2151 2 роки тому +1

    Another great vid. Keep it up sir! Thanks

  • @mohammadkhalafIraqi
    @mohammadkhalafIraqi 2 роки тому

    Great videos!

  • @pimpstyles010
    @pimpstyles010 2 роки тому

    Hi Andrew,
    I came across your UA-cam channel while studying up on RBAC and IAM governance opportunities within SailPoint. I am hugely passionate about IAM and all components, and I come from Cyber GRC background. I would love to chat with you on ideas for us to collaborate or learn mutually. TY! P.S. added you on Twitter, unable to connect on LinkedIn (but following) would prefer to communicate there.

    • @AllThingsIAM
      @AllThingsIAM  2 роки тому

      Allen...Dude, I would love this! IAM + GRC should always work together to build great policies and guidance for users.