You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/react/docs/workshop-guidance/devices/RMD_100.md
+33-1Lines changed: 33 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,41 @@
2
2
3
3
## Overview
4
4
5
+
## Benefits
5
6
7
+
1. Granular Permissions: RBAC allows administrators to assign specific permissions to different roles, ensuring that users only have access to the resources they need
8
+
9
+
2. Improved Security: By limiting access based on roles, RBAC reduces the risk of unauthorized access to sensitive data
10
+
11
+
3. Simplified Management: Administrators can easily manage permissions and roles from a central console, making it easier to enforce security policies
12
+
13
+
4. Compliance: Helps organizations meet compliance requirements by ensuring that only authorized users can access certain data and applications
14
+
15
+
## Drawbacks
16
+
17
+
Complex Setup: Setting up RBAC can be complex and time-consuming, especially in large organizations with many roles and permissions
18
+
19
+
Maintenance Overhead: Regularly updating and maintaining roles and permissions can be challenging, requiring ongoing administrative effort
20
+
21
+
Potential for Misconfiguration: Incorrectly configured roles can lead to either excessive access or insufficient access, impacting productivity and security
22
+
23
+
## Impact on End Users
24
+
25
+
Access Control: Users will only have access to the resources necessary for their roles, which can streamline their workflow and reduce distractions
26
+
27
+
Security Measures: Users might experience additional security measures, such as multi-factor authentication, based on their role
28
+
29
+
Support and Training: Users may need training to understand their access levels and how to request additional permissions if needed
30
+
31
+
## Relation to Zero Trust
32
+
33
+
Least Privilege Principle: RBAC aligns with the Zero Trust principle of least privilege by ensuring users have the minimum level of access necessary to perform their tasks
34
+
35
+
Continuous Verification: Intune's RBAC supports continuous verification of user permissions, ensuring that access is always appropriate and secure
36
+
37
+
Conditional Access: RBAC can be integrated with conditional access policies to enforce strict access controls based on user roles and device compliance
0 commit comments