Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:AIX
gptkb:observatory gptkb:Solaris |
gptkbp:allows |
Static role definitions
|
gptkbp:applies_to |
Cloud services
|
gptkbp:benefits |
Compliance requirements
|
gptkbp:can_be_used_with |
Attribute-Based Access Control (ABAC)
|
gptkbp:challenges |
Multi-tenant environments
Dynamic role assignments |
gptkbp:complement |
Policy-based access control
|
gptkbp:controls |
Access to sensitive data
|
gptkbp:defines |
NISTSP 800-162
RFC 7419 |
gptkbp:enables |
Role assignment
|
gptkbp:enhances |
Operational efficiency
|
gptkbp:facilitates |
Data protection
User provisioning Role engineering Role-based policies |
https://www.w3.org/2000/01/rdf-schema#label |
RBAC
|
gptkbp:is_adopted_by |
Financial institutions
Government agencies Data governance |
gptkbp:is_challenged_by |
Dynamic environments
User role changes |
gptkbp:is_characterized_by |
Role hierarchies
|
gptkbp:is_criticized_for |
Complexity in large organizations
Inflexibility in role assignments |
gptkbp:is_described_as |
User permissions based on roles
|
gptkbp:is_designed_to |
Simplify user management
|
gptkbp:is_documented_in |
Security frameworks
|
gptkbp:is_enhanced_by |
User training
Automation tools User activity monitoring Role analytics |
gptkbp:is_evaluated_by |
Security best practices
Risk assessments Security audits User satisfaction Performance impact |
gptkbp:is_implemented_in |
Software tools
Software applications Role management systems |
gptkbp:is_influenced_by |
Organizational policies
|
gptkbp:is_integrated_with |
Enterprise applications
Single Sign-On (SSO) solutions |
gptkbp:is_monitored_by |
Compliance purposes
|
gptkbp:is_often_used_in |
Enterprise environments
|
gptkbp:is_part_of |
gptkb:software
Access management frameworks Identity and Access Management (IAM) systems |
gptkbp:is_related_to |
Access Control List (ACL)
|
gptkbp:is_supported_by |
Identity management solutions
Access control policies Governance frameworks |
gptkbp:is_used_to |
Manage user access rights
|
gptkbp:is_utilized_in |
Healthcare systems
Resource management |
gptkbp:provides |
Least privilege access
|
gptkbp:reduces |
Risk of unauthorized access
|
gptkbp:supports |
Separation of duties
|
gptkbp:used_in |
Information Security
|