role-based access control

(redirected from Least privilege)
Also found in: Encyclopedia.

role-based access control

An information system that limits the access that NHS staff as a UK facility have to patient care records, including what information can be accessed, how a system user can access it and the system user’s role.
References in periodicals archive ?
From managed firewall and two factor authentication service to network segmentation and least privilege access, Expedient creates tailored solutions that fit the needs of its clients.
PowerBroker for Mac is the first solution made commercially available to establish and enforce least privilege on the OS X platform.
PowerBroker for Mac is the industry's first solution with a graphic interface to properly enable least privilege on OS X Mavericks, Yosemite, and El Capitan.
Also be sure to leverage the least privilege principle to ensure employees have access to only what's needed to perform their job roles.
The principle of least privilege simply means that no person, machine, or system should have access to things they don't strictly need.
Using such a system in a least privilege setting offers a way of blocking harmful applications (which often ask for admin rights to gain control of a target) while allowing 'standard' users to elevate these privileges according to pre-defined policies.
During the theatre presentation, Brian Hanrahan, Avecto Senior Systems Consultant, will explain how least privilege management empowers users with the privileges they need to perform their roles, without compromising the security of the corporate network.
Organisations must continue to adopt the principle of least privilege, even in a virtual environment:
The law also mandates user authentication with passwords or other factors of appropriate strength and least privilege access policies, along with systems monitoring for unauthorized access.
Cyber-Ark's new On-Demand Privileges Manager enables organisations to implement an effective least privilege policy and reduce existing insider threat vulnerabilities by provisioning superusers' rights on an as-needed basis, at the individual command level.
Users operate with least privilege rights and if an application explicitly requires admin rights, the software simply elevates privileges for the application, not the user.
Migration to Windows 7 has turned out to be the important moment where organisations reassessed hardened assumptions about the way employees use and access applications and a growing number have concluded that the rational response is to invest in least privilege management.
Full browser ?