Fact-checked by Grok 2 weeks ago
References
-
[1]
role-based access control (RBAC) - Glossary | CSRCA model for controlling access to resources where permitted actions on resources are identified with roles rather than with individual subject identities.
-
[2]
Role Based Access Control | CSRCSecurity administration with RBAC consists of determining the operations that must be executed by persons in particular jobs, and assigning employees to the ...Role Engineering and RBAC ...CSRC MENU
-
[3]
The NIST model for role-based access control - ACM Digital LibraryThis paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization.
-
[4]
[PDF] Role-Based Access Control (RBAC): Features and MotivationsGaithersburg MD 20899. Abstract. The central notion of Role-Based Access Control (RBAC) is that users do not have discretionary access to enterprise objects. ...
-
[5]
[PDF] Role-Based Access Control ModelsAlthough RBAC is policy neutral, it directly supports three well-known security principles: least privilege, separation of duties, and data abstraction. ... role.
-
[6]
[PDF] Role-based Access Control: an OverviewRole Based Access Control for use in SEPM. ▫ Present a Framework for Role. Based Access Control for both. Physical and Virtual Domains. ▫ Discuss Various AC ...
-
[7]
[PDF] Role-Based Access ControlsOct 13, 1992 · The premise of this paper is that there exists a control, referred to as. Role-Based Access Control (RBAC), that can be more appropriate and ...
-
[8]
[PDF] The NIST Model for Role Based Access ControlThe NIST RBAC model requires that user- role and permission-role assignment can be many- to-many. Thus the same user can be assigned to many roles and a single ...
-
[9]
Role Based Access Control | CSRCNov 21, 2016 · RBAC requires all access through roles, and permissions are connected only to roles, not directly to users. Another aspect of RBAC that ...Missing: principles | Show results with:principles
-
[10]
[PDF] Role-based Access Control' - Prof. Ravi SandhuAbstract. The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate ...
-
[11]
Evolution of Access Control: a bit of RBAC and ABAC historyFeb 24, 2025 · We started with the Discretionary Access Control (DAC) systems of the 1970s and saw the first instances of Role-Based Access Control (RBAC) by the late 1980s ...
-
[12]
The Definitive Guide to Role-Based Access Control (RBAC)... (NIST) first began to formalize the system we know as role-based access control. In that year, Ferraiolo and Kuhn laid the foundation for the model we use ...
-
[13]
Role-Based Access Controls | CSRCDavid Ferraiolo (NIST), Richard Kuhn (NIST). Conference. Name: 15th National Computer Security Conference (NCSC) Dates: 10/13/1992 - 10/16/1992
-
[14]
[PDF] The Economic Impact of Role-Based Access ControlThe National Institute of Standards and Technology (NIST) began working on role-based access control (RBAC) in the early 1990s after a study of federal agency ...<|separator|>
-
[15]
[PDF] Role Based Access Control for Enterprise Services - DTICJun 15, 2004 · The current Department of Defense (DoD) Network consists of separate domains, disparate networks that are geographically dispersed, and ...
-
[16]
Need a way to control network access? Government already has it.Apr 4, 2011 · The RBAC work evolved from a 1991 NIST study that found agencies were not getting all the security solutions they needed. In the early 1990s ...
-
[17]
[PDF] A Proposed Standard for Role-Based Access ControlDec 18, 2000 · This paper describes a proposed standard for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization.
-
[18]
Access control as a service for the CloudJun 1, 2015 · Many legacy systems rely on Role Based Access Control (RBAC) for controlling access to resources stored by 3rd parties (e.g., Cloud providers, ...Missing: history | Show results with:history
-
[19]
A survey on access control techniques for cloud, blockchain, IoT and ...An RBAC solution requires the administrator to have an in-depth understanding of the security map of the organization and how permissions were previously ...Missing: post- | Show results with:post-
-
[20]
(PDF) Role-Based Access Control (RBAC) in Modern Cloud Security ...Apr 5, 2025 · This article examines the evolving role of Role-Based Access Control (RBAC) in modern cloud security governance, with particular emphasis on its implementation ...Missing: 2010s | Show results with:2010s
- [21]
-
[22]
ISO/IEC 24760-1:2025 - A framework for identity managementIn stock 2–5 day deliveryISO/IEC 24760-1:2025 defines the core terminology and concepts essential to identity management in the context of information security, cybersecurity and ...
-
[23]
SP 800-53 Rev. 5, Security and Privacy Controls for Information ...This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets.SP 800-53B · SP 800-53A Rev. 5 · CPRT Catalog · CSRC MENUMissing: RBAC | Show results with:RBAC
-
[24]
Role Engineering and RBAC Standards - Role Based Access ControlAmerican National Standard 359-2004 is the fundamental Information Technology industry consensus standard for RBAC. In 2000, NIST proposed a unified model for ...
-
[25]
[PDF] Role Engineering: Methods and Standards - What is RBAC?Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the ...
-
[26]
What is Role-Based Access Control (RBAC) and How It Works?Oct 3, 2025 · Here's a step-by-step look at how RBAC works: Define Roles: The first step in implementing RBAC is to define the roles within the organization.
-
[27]
[PDF] Role-Based Access Control (RBAC): Features and MotivationsDec 15, 1995 · This is achieved by statically and dynamically regulating users' actions through the establishment and definition of roles, ole hierarchies,.
-
[28]
[PDF] The NIST Model for Role-Based Access Control - Prof. Ravi SandhuThe NIST RBAC model requires that user- role and permission-role assignment can be many- to-many. Thus the same user can be assigned to many roles and a single ...
-
[29]
[PDF] 2010 Economic Analysis of Role-Based Access Control - Final ReportDec 19, 2010 · Comparison of Forecasted and Actual RBAC Adoption, 1992–2010 ... developing and customizing RBAC products and product modules for the enterprise ...Missing: cloud | Show results with:cloud
-
[30]
[PDF] The ARBAC97 Model for Role-Based Administration of RolesARBAC97 has three components: URA97 (user-role assignment '97), PRA97 (permission- role assignment '97) and RRA97 (role-role assignment. '97). URA97 was ...
-
[31]
10 RBAC Best Practices You Should Know in 2025 - OsoEstablish regular maintenance processes from the start: Implement access recertification where managers periodically attest to their team's access.
-
[32]
Role-Based Access Control (RBAC): A Comprehensive GuideJun 27, 2025 · Sessions and Assignments (SA, PA, SE). Sessions and Assignments define the relationship between users, roles, and permissions in the RBAC model.
-
[33]
Role-Based Access Control (RBAC) - KiteworksRegular Role and Permission Reviews. Establish scheduled audits to review role definitions and permission assignments, ensuring they remain aligned with ...Missing: cycles | Show results with:cycles
-
[34]
How RBAC Works: The Fundamentals of Role-Based Access ControlMay 22, 2024 · Role-Based Access Control (RBAC) is an access management model in which users do not receive permissions directly. Instead, permissions are granted to roles.<|control11|><|separator|>
-
[35]
RBAC User Behavior Analytics: Adaptive Access Control for Real ...Oct 16, 2025 · Feed audit logs into a UBA engine that can identify patterns over time. Watch for role drift, sudden spikes in activity, or access outside ...
-
[36]
What is Role-Based Access Control (RBAC) in IAM? - VincacyberSep 20, 2024 · Anomaly Detection: Using automated tools to detect unusual or unauthorized access attempts. Regular Audits: Conducting regular audits to verify ...
-
[37]
How Role-Based Access Control (RBAC) Strengthens Your Data ...Sep 5, 2025 · RBAC isn't just about compliance—it's about operational efficiency. By managing access through roles, you reduce human error, speed up access ...
-
[38]
SOX User Access Reviews: Best Practices - SecurEndsApr 1, 2025 · 4. Best User Access Review Practices for Ensuring SOX Compliance · 1. Schedule Regular SOX Reviews · 2. Implement Role-Based Access Control (RBAC).Missing: recertification | Show results with:recertification
-
[39]
Access Certification: Process, Risks & Best Practices ExplainedApr 10, 2025 · Regulatory compliance: From SOX to NIST and the GDPR, many regulations require organizations to regularly review accounts for compliance ...
-
[40]
How SIEM Enhances Security in Financial Institutions - SearchInformIn addition to real-time monitoring, SIEM solutions for financial institutions offer detailed reporting tools that simplify the auditing process. This means ...
-
[41]
[PDF] ITL Buletin, Exploring the Next Generation of Access Control ...Discretionary access control (DAC) is an administrative policy that permits system users to allow or disallow other users' access to resources that are placed ...
-
[42]
[PDF] DSS Security Assessment - NASA Technical Reports ServerRBAC: Implementing RBAC ensures only authorized personnel and services can access ... Reviews will help prevent privilege creep over time. Data Segregation ...
-
[43]
Access Control Lists - Win32 apps - Microsoft LearnJul 9, 2025 · A discretionary access control list (DACL) identifies the trustees that are allowed or denied access to a securable object. When a process tries ...
-
[44]
[PDF] Adding Attributes to Role-Based Access ControlProper operation of RBAC requires that roles fall under a single administrative domain or have a consistent definition across multiple domains, so distributed ...<|control11|><|separator|>
-
[45]
[PDF] Guide to Attribute Based Access Control (ABAC) Definition and ...As the. RBAC specification gained popularity, it made central management of enterprise access control capabilities possible and reduced the need for ACLs. ABAC.
-
[46]
SP 800-178, A Comparison of Attribute Based Access Control ...Oct 3, 2016 · XACML and Next Generation Access Control (NGAC) are very different attribute based access control (ABAC) standards with similar goals and objectives.
-
[47]
[PDF] Zanzibar: Google's Consistent, Global Authorization System | USENIXThis paper presents Zanzibar, a system for storing per- missions and performing authorization checks based on the stored permissions. It is ...
-
[48]
Zanzibar: Google's Consistent, Global Authorization SystemThis paper presents the design, implementation, and deployment of Zanzibar, a global system for storing and evaluating access control lists.
-
[49]
List of Role-Based Permissions - SAP Help PortalThis is a main list of role-based permissions used across the SAP SuccessFactors HCM suite. Remember All customers have access to the SAP SuccessFactors ...Missing: enterprise | Show results with:enterprise
-
[50]
How Enterprise Software Implements Role-Based Access Control ...Role-based access control (RBAC) is an authorization system designed to regulate access to systems and data by linking permissions directly to specific ...
-
[51]
Access Control and Governance for Financial Management - SAPDiscover how the SAP Access Control application streamlines managing and validating user access to on-premises financial management applications and data.Missing: cases HR ERP
-
[52]
What is Role-Based Access Control (RBAC)? - BalbixJun 16, 2025 · Supports compliance with regulations like HIPAA, PCI DSS, and NIST. Reduces privilege creep and insider threats. Scales easily for large ...
-
[53]
Cybersecurity 101: What is Role-Based Access Control (RBAC)?RBAC is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise.Missing: 22510 | Show results with:22510
-
[54]
Role Based Access Control (RBAC): A Comprehensive GuideIn summary, RBAC is instrumental in establishing robust access control mechanisms in cloud environments, enabling organizations to achieve security, compliance ...
-
[55]
[PDF] Security Analysis in Role-Based Access ControlThe administration of large Role-Based Access Control (RBAC) systems is a challenging problem. A case study carried out with Dresdner Bank, a major European ...
-
[56]
The role-based access control system of a European bankThe role-based access control system of a European bank: a case study and discussion. Authors: Andreas Schaad.Missing: studies organizations
-
[57]
Role-based Access Control in Large OrganizationsThey look to enable role-based access control (RBAC) to further automate user access and better support their audit and compliance requirements.Missing: banks | Show results with:banks
-
[58]
Three RBAC policy challenges that can be solved with ABACSep 14, 2023 · When using a role-based access control (RBAC) model organizations can run into different challenges as they scale.
-
[59]
Role based access control and best implementation practicesMar 20, 2019 · Lack of executive sponsorship and funding · Not involving business users during the role mining activities · Insufficient communication of RBAC ...
-
[60]
rbac - Role-Based Access Control DisadvantagesFeb 14, 2017 · The main disadvantage of RBAC is what is most often called the 'role explosion': due to the increasing number of different (real world) roles.
-
[61]
IAM roles - AWS Identity and Access ManagementAn IAM role is an IAM identity that you can create in your account that has specific permissions. An IAM role is similar to an IAM user.
-
[62]
What is Azure role-based access control (Azure RBAC)?Mar 12, 2024 · A role assignment is the process of attaching a role definition to a user, group, service principal, or managed identity at a particular scope ...Role Definition · Azure Resource Manager · Azure ABAC
-
[63]
Understanding Zero Trust principles - AWS Prescriptive GuidanceThis includes implementing just-in-time access provisioning, role-based access controls (RBAC), and regular access reviews to minimize the surface area and the ...
-
[64]
Role Based Access Control Good Practices - KubernetesMar 27, 2024 · Kubernetes RBAC is a key security control to ensure that cluster users and workloads have only the access to resources required to execute their roles.General Good Practice · Kubernetes Rbac - Privilege... · Persistent Volume CreationMissing: microservices | Show results with:microservices
- [65]
-
[66]
[PDF] Department of Defense Zero Trust Reference Architecture - DoD CIOJul 4, 2022 · “Zero Trust is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on ...
-
[67]
Integrating Attributes into Role-Based Access Control | Request PDFAug 7, 2025 · ABAC has features complimentary to RBAC, and merging RBAC and ABAC has become an important research topic. This paper proposes a new approach to ...
-
[68]
Serverless computing: a security perspectiveOct 23, 2022 · In this article we review the current serverless architectures, abstract and categorize their founding principles, and provide an in-depth security analysis.
-
[69]
Research on the Implementation of RBAC–ABAC Hybrid Models in ...Sep 30, 2025 · This study investigates the implementation of a hybrid access control model that integrates RBAC (Role-Based Access Control) and ABAC (Attribute ...
-
[70]
RBAC For Your CI/CD Pipeline: Why and How - DevOps.comDec 14, 2023 · Role-based access control, or RBAC, is an approach to managing access and permissions in a system based on the roles of individual users.
-
[71]
Role-based access control for DevOps tools - Azure - Microsoft LearnOct 9, 2023 · Learn about security considerations for role-based access control in DevOps Tools for Landing Zones.
-
[72]
[PDF] Towards Managed Role ExplosionOur hypothesis is that medium to large organiza- tions are either managing their role explosion in a flexible, scalable RBAC system like ACME University or they ...
-
[73]
Analysis of Privilege Escalation Based on Hierarchical RBAC ModelThree types of vulnerabilities, Upward Privilege Escalation, Downward Privilege Escalation and Horizonal Privilege Escalation, are defined and decided ...
-
[74]
SoD Violations: 5 Main Causes and How Analytics Can Prevent ThemApr 25, 2023 · An SoD violation occurs when a user exploits an SoD risk by performing both ends of a separated business process to complete one or more transactions.
-
[75]
What Is Role-Based Access Control (RBAC)? - IBMRole-based access control (RBAC) is a model for authorizing end-user access to systems, applications and data based on a user's predefined role.<|control11|><|separator|>
-
[76]
[PDF] Dynamic Role-Based Access Control Model - Journal of SoftwareDynamic RBAC bases on the classic model, includes static constraints and dynamic constraints, static permissions and dynamic permissions, compared with.
-
[77]
Four Role-based Access Control (RBAC) Limitations and How to Fix ...Sep 23, 2021 · Zero Trust Create dynamic policies that meet the evolving demands of Zero Trust · Identity Breaches Minimize the blast radius of a breach by ...
-
[78]
[PDF] A Case Study of the Capital One Data BreachBy combining the SSRF attack and the WAF misconfiguration, the attacker used the URL. “http://169.254.169.254/iam/security-credentials” to obtain the ...Missing: RBAC | Show results with:RBAC
-
[79]
Common Poor Access Management Risks and How They Cause ...Jul 30, 2025 · Common Risks Associated with Poor Access Management · 1. Over-Permissioned Accounts · 2. Stale Accounts · 3. Poorly Defined Role-Based Access ...Missing: 2010s | Show results with:2010s