Skip to content

Commit 2e83af7

Browse files
Merge pull request #232 from hermanarnedo/patch-19
Update RMD_100.md
2 parents 8a99baa + e3b16de commit 2e83af7

File tree

1 file changed

+33
-1
lines changed
  • src/react/docs/workshop-guidance/devices

1 file changed

+33
-1
lines changed

src/react/docs/workshop-guidance/devices/RMD_100.md

Lines changed: 33 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,41 @@
22

33
## Overview
44

5+
## Benefits
56

7+
1. Granular Permissions: RBAC allows administrators to assign specific permissions to different roles, ensuring that users only have access to the resources they need
8+
9+
2. Improved Security: By limiting access based on roles, RBAC reduces the risk of unauthorized access to sensitive data
10+
11+
3. Simplified Management: Administrators can easily manage permissions and roles from a central console, making it easier to enforce security policies
12+
13+
4. Compliance: Helps organizations meet compliance requirements by ensuring that only authorized users can access certain data and applications
14+
15+
## Drawbacks
16+
17+
Complex Setup: Setting up RBAC can be complex and time-consuming, especially in large organizations with many roles and permissions
18+
19+
Maintenance Overhead: Regularly updating and maintaining roles and permissions can be challenging, requiring ongoing administrative effort
20+
21+
Potential for Misconfiguration: Incorrectly configured roles can lead to either excessive access or insufficient access, impacting productivity and security
22+
23+
## Impact on End Users
24+
25+
Access Control: Users will only have access to the resources necessary for their roles, which can streamline their workflow and reduce distractions
26+
27+
Security Measures: Users might experience additional security measures, such as multi-factor authentication, based on their role
28+
29+
Support and Training: Users may need training to understand their access levels and how to request additional permissions if needed
30+
31+
## Relation to Zero Trust
32+
33+
Least Privilege Principle: RBAC aligns with the Zero Trust principle of least privilege by ensuring users have the minimum level of access necessary to perform their tasks
34+
35+
Continuous Verification: Intune's RBAC supports continuous verification of user permissions, ensuring that access is always appropriate and secure
36+
37+
Conditional Access: RBAC can be integrated with conditional access policies to enforce strict access controls based on user roles and device compliance
638

739
## Reference
840

9-
*
41+
* https://learn.microsoft.com/en-us/mem/intune/fundamentals/role-based-access-control
1042

0 commit comments

Comments
 (0)