The dangers of role-based access control (RBAC)

The dangers of role-based access control (RBAC)

HomeInfosecThe dangers of role-based access control (RBAC)
The dangers of role-based access control (RBAC)
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Balaji Parimi, founder and CEO of CloudKnox Security, discusses the current issues with role-based access control and how access control can evolve to make it more secure.

– Join the fight against cybercrime: https://infosecinstitute.com
– Special offer for Cyber Work listeners: https://www.infosecinstitute.com/podcast

In the podcast, Parimi and moderator Chris Sienko discuss:

– When did you first become interested in computers and security? (1:16)
– What does CloudKnox offer its customers and what role does the company play in the cybersecurity landscape? (2:13)
– What is role-based access control? How does it work and how can it be used to protect your network? (8:02)
– What are the benefits of using RBAC? If implemented well, can RBAC still be an effective method of access control? (9:20)
– How can we move away from the default setting of giving all employees all privileges out of convenience and adjust the privileges according to the requirements of the position? (11:10)
– What are the problems associated with high-risk privileges? (12:05)
– What role do non-human identities play? Do things like service accounts associated with modular coding components, microservices, software containers, and APIs contribute to this problem? (14:46)
– How much time and resources would a company actually have to invest to reform its authorization levels? (16:20)
– Do organizations need to be made aware that user over-privilege is a problem? (18:07)
–If these problems of oversupply are not solved, what is a safer alternative? Is one in sight? (21:30)
– In a new, more secure system, would privileges be requested and obtained the moment the task requires them? (22:11)
– What kind of practical experience, training and certifications would you recommend to people who want to work in access control and provisioning? What job titles and positions should they go through on their way into this field? (23:21)
– Are there practical exercises that you can do to learn how to grant privileges without actually being employed to do that work? (25:28)
– Where will this trend of over-privileging identities in identity and access control develop in the coming years? (26:43)
– If listeners want to learn more about you or CloudKnox, where can they go online? (28:47)
Want to hear more conversations like this? Subscribe to the Cyber Work Podcast:

– Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-work/id1419689068
– Google Podcasts: https://podcasts.google.com/?feed=aHR0cHM6Ly9yZXNvdXJjZXMuaW5mb3NlY2luc3RpdHV0ZS5jb20vZmVlZC9wb2RjYXN0Lw
– Subscribe on Android: https://subscribeonandroid.com/resources.infosecinstitute.com/feed/podcast/
– Spotify: https://open.spotify.com/show/4cLhlbHkSgyk01bZyL3gWA

About Infosec
At Infosec, we believe that knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a comprehensive program of certifications and skills development training. We also provide security awareness and training to all employees to help them stay cyber safe at work and at home. Infosec was founded by smart people who want to do good. The company trains entire organizations to protect themselves from cybercrime. That's what we do every day – we equip everyone with the latest security knowledge so the good guys win.

For more information, visit infosecinstitute.com.

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.