General security

The dangers of role-based access control (RBAC)

July 29, 2019 by Darren Dalasta

Balaji Parimi, founder and CEO of CloudKnox Security, discusses the current problems with role-based access control and how access control is evolving to become more secure.

In the podcast, Parimi and host Chris Sienko discuss:

– When did you first get interested in computers and security? (1:16)
– What does CloudKnox offer its clients and what is its role in the cybersecurity landscape? (2:13)
– What is role-based access control? How does it work, and how is it meant to be used to protect your network? (8:02)
– What are the upsides of using RBAC? If done well, can RBAC still be an effective method of controlling access? (9:20)
– How do we start pulling back from the default setting of giving all employees all the privileges as a matter of convenience and customizing privileges according to the needs of the position? (11:10)
– What are some of the issues involving high-risk privileges? (12:05)
– What is the role of non-human identities? Do things like service accounts that connect to modular coding components, microservices, software containers and APIs feed into this issue? (14:46)
– What is the actual time and resource commitment that a company would need to undertake to reform its privilege levels? (16:20)
– Does there need to be outreach to organizations to let them know that over-privileging users is a problem? (18:07)
–If these issues of over-provisioning aren’t solved, what’s a safer alternative? Is there one on the horizon? (21:30)
– Under a new, safer system, would privileges be requested and gained in the moment as the task requires them? (22:11)
– What types of hands-on experience, education and certs would you recommend for people looking to work in access control and provisioning? What job titles and positions should they move through on their way to this area? (23:21)
– Are there hands-on exercises you can use to learn how privileging works without actually being employed to do the work? (25:28)
– Where do you see this trend of over-privileging identities going in the years to come for identity and access control? (26:43)
– If listeners want to learn more about you or CloudKnox, where can they go online? (28:47)

Additional Resources

– Join us in the fight against cybercrime:
– Special offer for Cyber Work listeners:

About the Cyber Work Podcast

Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.

Posted: July 29, 2019
Articles Author
Darren Dalasta
View Profile

Notice: Undefined index: visitor_id12882 in /www/resourcesinfosecinstitute_601/public/wp-content/plugins/infosec-user-info/infosec-user-info.php on line 117