Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
Identity and Access Management Architecture ◾  229
Entitlements
Without roles: Typical practice
User:
Resource:
- e entity requesting access to a resource
- Ex: John Smith, AppXYZ
- Ex: App, data base, service, and so on
- A permission to access a particular resource
- Ex: Open table, read record, write record
Entitlement:
Figure 17.6 A reactive approach to granting entitlements, or permissions for users to access
certain resources, can grow into an entangled web of relationships that becomes increasingly
difficult to visualize, much less control.
With roles: Best practice
User:
Resource:
Entitlement:
Business role:
Application role:
- A logical collection ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498