RBAC vs. ABAC: Future-Proofing Access Control

About the Paper

Data is always evolving. The access control methods we use should be doing the same.

Data collection and analysis are integral to the success of modern organizations. What’s even more important is making sure that this data, especially when sensitive, doesn’t fall into the wrong hands.

This end has been achieved over time by implementing various access control models, which limit who is allowed to see what data and for which reasons. In today’s era of cloud computing and storage, it is essential that access control models evolve to suit the most current and pressing business needs while still maintaining full security.

In this white paper, we’ll take a look at:
  • The evolution of access control models over time
  • The past successes and struggles of role-based access control (RBAC)
  • The current future-proof success of attribute-based access control (ABAC)
  • A head-to-head comparison of RBAC and ABAC in modern use
By registering to download this White Paper hosted by DATAVERSITY®, as applicable by local privacy laws, you agree to receive marketing e-mail notifications from DATAVERSITY, sponsors, and partners associated with this paper. Use of this contact data is governed by each individual entity’s Privacy Policy. Just click the “unsubscribe” or "Manage Your Email Subscriptions" link in any e-mail to unsubscribe.