What is RBAC ?

Why do we need it?

Pandhu Wibowo
3 min readApr 14, 2023
Photo by Carine L. on Unsplash

Hi guys, long time no see. For all of you new joiners, welcome.

I’m Pandhu. And I am a Software Engineer. In this session, I am going to explain about RBAC. So check this out my deep explanation on below.

Table of content

  • What is meaning of RBAC ?
  • Strategy to determine RBAC management

Definition of RBAC

Role-Based Access Control (read: RBAC) is a security approach that authorizes and restricts system access to users based on their role(s) within an organization. The roles in RBAC refer to the levels of access that employees have to the network or system. This protects sensitive data, privileges, and ensures employees can only access information and perform actions they need to do their jobs.

Let’s sees the picture on above. We have let’s say Mini ERP. We 5 roles and 6 modules.

IT Administrator have all privileges to accessing it. But when you see the others, the rest do not have all the privileges. As you can see for example, Staff just have one privilege, they are just have Marketing module.

As a result, lower-level employees usually do not have access to sensitive data if they do not need it to fulfill their responsibilities. This is especially helpful if you have many employees and use third-parties and contractors that make it difficult to closely monitor network access. Using RBAC will help in securing your company’s sensitive data and important applications.

Strategy to determine RBAC management

Some of the designations in an RBAC tool can include:

  • Management role scope — it limits what objects the role group is allowed to manage.
  • Management role group — you can add and remove members.
  • Management role — these are the types of tasks that can be performed by a specific role group.
  • Management role assignment — this links a role to a role group.

Best practices for implementing Role Based Access Control

RBAC best practices able to achieved following these steps:

  • Define data and resources to which access must be limited
  • Create roles with the same access needs
  • Avoid creating too many roles as in this case you will defeat the purposed and run a risk of creating a user-based access control instead of RBAC
  • Aligned the roles with users within your organization
  • Analyze how roles can be altered and how new users can be registered and old accounts terminated
  • Ensure a company-wide RBAC that is integrated across all systems
  • Arrange user training so that the members are aware of the RBAC principles
  • Conduct audit to ensure that everything is followed through as planned

That’s all. Cheers 🥂

--

--

Pandhu Wibowo

Assalamu’alaikum. I’m Software Engineer | Tech Enthusiast — Support me on beneteen.com | Follow me : https://www.instagram.com/pandhu.wibowo/