Perceptions around scalability and management of an ABAC model must be addressed, along with the perceived complexity of policy frameworks and legacy integration capabilities that aren’t capable of making just-in-time decisions.
Blog
90 Results Found - Page 2 of 12
Enabling Use Cases with ABAC
The number of use cases that can be enabled by attribute-based access controls are as many and as varied as the attributes themselves. This blog collects multiple cases to illustrate what becomes possible when policy becomes the new perimeter for protecting access to data and…
Understanding the Benefits of ABAC Over Other Approaches
ABAC offers much more than other approaches: better security, authoritative claims, detailed compliance, change resiliency, real-time enforcement, and the value of explicit frameworks.
Customer-Managed Trust Through a True Separation of Powers: Ionic Machina for Google Cloud External Key Manager
Get a technical overview of the solution and an explanation of policy-driven access controls, including comparisons to other methods to explore how Machina for EKM resolves the tension between competing needs
Defining ABAC
The third of this seven-part series defines attribute-based access controls, which go beyond just users and roles to perform a comprehensive evaluation across multiple vectors
Ionic Releases New Machina Tools for Amazon S3, Google Cloud Storage, and Azure Blob Storage
New cloud connectors for S3, GCS and Azure enable developers to protect and control access to data stored in the cloud.
Pinpointing the Shortcomings of RBAC
The second of this seven-part series examines the shortcomings of RBAC (role-based access control) models in the face of rapid change
If Policy is the New Perimeter, then Attribute-Based Access Controls Make it Possible
The first of this seven-part series traces the evolution of access controls from access control lists (ACLs) to the role based access controls (RBAC) used by most identity solutions.