Are access controls for institutional accounts based on structured rules, such as role-based access control (RBAC), attribute-based access control (ABAC), or policy-based access control (PBAC)?
Explanation
Guidance
This includes end users, administrators, service accounts, etc. PBAC would include various dynamic controls such as conditional access, risk-based access, location-based access, or system activity–based access.
Example Responses
Example Response 1
Yes, our application implements Role-Based Access Control (RBAC) as the primary access control model for all institutional accounts User permissions are assigned based on predefined roles that align with job functions (e.g., Student, Instructor, Department Admin, System Admin) For administrative and service accounts, we implement additional Policy-Based Access Control (PBAC) elements, including conditional access that requires multi-factor authentication for privileged operations and location-based restrictions that limit administrative access to specific IP ranges All access control policies are centrally managed through our Identity and Access Management (IAM) system, with regular reviews to ensure the principle of least privilege is maintained.
Example Response 2
Yes, we implement a hybrid approach combining RBAC and ABAC models Our base permissions structure uses RBAC with clearly defined roles for different user types (end users, departmental administrators, and system administrators) This is enhanced with attribute-based controls that consider factors such as data sensitivity classifications, user department, and project assignments For example, a researcher might have access to specific datasets only if they are part of an approved research team AND the data sensitivity level matches their clearance AND they're accessing from an approved network Service accounts operate under strict RBAC controls with time-limited access tokens and are regularly audited All access control decisions are logged for compliance and security monitoring purposes.
Example Response 3
No, our current access control system does not fully implement structured rules like RBAC, ABAC, or PBAC We currently use a custom permission system where access rights are assigned individually to users based on manager approval While this system has worked for our small organization, we recognize the limitations as we scale We're currently in phase 2 of a 3-phase project to implement RBAC across all institutional accounts, with completion expected in Q3 of this year The first phase, which included mapping all job functions to appropriate role definitions, has been completed We're currently implementing these roles in our identity management system, and the final phase will involve migrating all users to the new role-based structure.
Context
- Tab
- Infrastructure
- Category
- Application/Service Security

