In an organization implementing an access management system for its HR application, how can the administrator ensure that employees only have access to the resources that align with their job functions?
Establish request-based access control that allows managers to grant access when necessary
Adopt a discretionary access control mechanism allowing employees to share access with each other.
Implement a user-based access control system where each employee is assigned custom permissions.
Use Role-based access control to assign permissions based on job functions.
Utilizing Role-based access control (RBAC) enables the organization to define distinct job functions and assign relevant permissions to these functions. This approach streamlines management by grouping permissions according to roles, making it easier to manage access effectively. Other methods, such as individual user permissions or discretionary sharing, can lead to permission sprawl and increased administrative workload, making them less effective for structured access management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Role-Based Access Control (RBAC)?
Open an interactive chat with Bash
What are the benefits of using RBAC over other access control models?
Open an interactive chat with Bash
What challenges might arise in implementing RBAC?
Open an interactive chat with Bash
ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access