Reading Class 25 - meron-401n14/seattle-javascript-401n14 GitHub Wiki
Role-based access control(RBAC) restricts network access based on a person's role within an organization and has become one of the main methods for advanced access control.
Best Practices for implementing RBAC
Here are few things to map out first
- Current status : Create a list of every software, hardware and app that has some sort of security.
- Current Roles: Even if you don’t have a formal roster and list of roles, determining what each individual team member does may only take a little discussion.
- Write a policy : Any changes made need to be written for all current and future employees to see.
- Make Changes: once the current security status and roles are understood (not to mention a policy is written), it's time to make changes.
- Continually Adapt : it's likely that the first iteration of RBAC will require some tweaking. Early on, you should evaluate your roles and security status frequently.