Are access controls for staff within your organization based on structured rules, such as RBAC, ABAC, or PBAC?
Explanation
Guidance
This includes system administrators and third-party personnel with access to the system. PBAC would include various dynamic controls such as conditional access, risk-based access, location-based access, or system activity–based access.
Example Responses
Example Response 1
Yes, our organization implements Role-Based Access Control (RBAC) as our primary access control model across all systems and applications Access rights are assigned based on job functions and responsibilities, with predefined roles such as 'Read-Only User', 'Content Editor', 'Department Administrator', and 'System Administrator' We use Microsoft Azure AD and Okta for identity management, with role assignments managed through these platforms For system administrators and third-party vendors, we implement even stricter controls with temporary elevated access through a Privileged Access Management (PAM) solution that requires approval workflows and provides time-limited access All access grants are reviewed quarterly, and we maintain comprehensive logs of all access activities.
Example Response 2
Yes, we implement a hybrid approach combining RBAC and PBAC Our base access control structure uses role-based permissions aligned with job functions, but we enhance this with policy-based conditional access rules For example, administrators accessing sensitive systems must use company-managed devices, connect from approved networks or via VPN, and complete multi-factor authentication For third-party vendors, we implement just-in-time access that expires after a defined period and requires re-authorization Our system also evaluates risk signals during authentication attempts and may require additional verification steps based on unusual access patterns, location changes, or device characteristics This dynamic approach allows us to maintain security while providing appropriate access flexibility.
Example Response 3
No, we currently do not implement structured access control models like RBAC, ABAC, or PBAC across our organization Our access management is handled on a case-by-case basis by system owners who manually assign permissions based on email requests and manager approvals While we recognize this is not ideal from a security perspective, we are a small organization (under 50 employees) with limited IT resources We do maintain an access spreadsheet that documents who has access to what systems, and we conduct manual reviews of this documentation quarterly We are currently evaluating identity management solutions that would allow us to implement RBAC within the next 6-12 months as part of our security roadmap.
Context
- Tab
- Infrastructure
- Category
- Application/Service Security

