From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Understanding role-based access control (RBAC)

Understanding role-based access control (RBAC)

- [Instructor] Role-based access control, or RBAC, as the name suggests, set up user permissions based on roles. Now, these not only apply to users, but also apply to programs and applications. Each role that you configure and define represent either users or programs with similar or identical permissions in a system or multiple systems. This type of access control is extremely popular nowadays with cloud services, different implementations, like Kubernetes, and many others. The value add of RBAC is that a role is created and assigned, the access that is required for personal work on that role or an application that should be doing a specific function. For example, when a user takes on a job or in a specific role, the administrator then assigns them to the appropriate role and to the appropriate permissions. For instance, if the user is within an engineering team, then, of course, they're only assigned permissions for the systems and applications that engineering should have access…

Contents