Wave Methodology- A Practical Guide to Defining Roles for Access Control
As the number and type of users who require access to organizations’ computer-based resources continues to climb; the traditional method of managing user access on a case-by-case basis has quickly become antiquated. Defining user roles as a way to manage access to computer-based systems is an efficient, effective alternative to managing access on a user-by-user basis—which can be virtually impossible when dealing with large numbers of dynamic users. This white paper explores a seven-step process which has proven to be an effective method for administrators to identify user roles for access control.