role-based access control

(redirected from Least privilege)
Also found in: Encyclopedia.

role-based access control

An information system that limits the access that NHS staff as a UK facility have to patient care records, including what information can be accessed, how a system user can access it and the system user’s role.
Segen's Medical Dictionary. © 2012 Farlex, Inc. All rights reserved.
References in periodicals archive ?
MarAd's lack of adherence to DOT policy on encryption, use of least privilege, protection of PII, and password storage creates a risk for unauthorized access to MarAd" and other information, the report affirmed.
Analysis from BeyondTrust's recent Microsoft Vulnerabilities Threat Report supports Gartner's top security priorities, finding that enforcing least privilege and removing admin rights from users eliminates 81% of Microsoft vulnerabilities.
Zero Trust Privilege helps enterprises grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
The 'least privilege' principle requires that a subject (human or software) has the proper and minimum privilege (in terms of scope of authority and resources).
The idea is that the least privilege necessary for the roles to have meaning is enabled, while offering proper access for the data and applications.
(d) In the context of protecting personal information, the principle of least privilege means that access to personal information should be restricted to those employees who need the information to perform their jobs.
A least privilege policy limits potential damage in the event the database credentials are compromised.
* 59% don't enforce a least privilege model for access to this data
Castle recommends adopting the principle of least privilege. If a user needs access to data or some other elevated privilege, what is the minimum level of privilege required to do the tasks and how long will they need that privilege?
Government agencies and enterprises can rely on PowerBroker to achieve least privilege on Unix and Linux systems, which nearly every recent Federal Cybersecurity mandate stresses as being a critical step to securing information systems.
- Account Weakness and Compliance ARC: Allows organizations to improve access control measures by developing and enforcing user management policies, including effective passwords, account transition and least privilege policies.
Staying up to date with software and operating system patches is one of the top ways to protect yourself from threats, along with running at least privilege and application whitelisting.
Full browser ?