Guiding and Managing the Implementation of Attribute Based Access Control
Business demands information management that meets their needs. From an IT perspective, it means that stakeholders are demanding access to information services that reach far beyond the boundaries of the organisation. At the same time, they are also expecting the IT department to protect their high-value information assets and intellectual property.
How can you ensure that enabling remote and mobile access to your protected information services will not compromise your high-value information assets?
Guiding and Managing the Implementation of Attribute Based Access Control
When implemented as part of a broader assured identity and information sharing capability, attribute-based access control (ABAC) enables fine-grained, dynamic access control that supports the sharing of information within and between organisations.
Download this white paper to understand:
- How to ensure an access control solution works with the ICT enterprise architecture so that it aligns with the broader organisational context and works seamlessly with all information management systems and information workflows.
- Why it’s important for an organisation to determine what it needs to know, what it has, what it wants to secure/use/delete, who should have it, where they need it, when and via which kinds of devices.
- How ABAC enforces the conditions under which access can be granted to data, a device, or system, within any given context.