An Enterprise Authorization Framework Requires Identity and Context
We recently completed a consulting engagement to create an authorization framework for a large financial services organization. As illustrated, the framework has three dimensions: Runtime authorization patterns, policy models, and governance structures.
The “runtime authorization patterns” describe the components, interfaces,… Continue reading
May 19 Webinar: Dan Beckett on Toxic Pairs, Role Explosion, and the Evolution of RBAC
It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is no stranger to these complexities. Managing access control and entitlements has… Continue reading
April 12 Webinar: The CISO’s Guide to Planning for ABAC Success
ABAC, Attribute Based Access Control, is the new model for access control as identified by NIST and Gartner, to help organizations meet the needs of the evolving complexities of today’s business environments.
Security Architects Partners is partnering with Axiomatics to… Continue reading