Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis announces strategic partnership with Microsoft to acclerate the secure adoption of Copilot.

Learn more

What is Role-Based Access Control (RBAC)?

6 min read
Last updated June 16, 2023

Organizations of all sizes are worried about securing their IT investments and a key part of this is providing users limited access only to the resources that they need to perform their work. This is known as the Principle of least privilege

While a laudable goal, it's often been too time-consuming and complicated to implement effectively.  As more data and systems come online every year a more effective, quicker to implement, and easier way to manage access is needed which is where Role-Based Access Control (RBAC) comes into the picture.

Get the Free Pen Testing Active Directory Environments EBook

What is Role-Based Access Control (RBAC)?

Role-Based Access Control (RBAC) is the modern role-based permissions management model that helps in managing access at both the broad as well as the granular level by aligning the assigned permissions role with the organizational role of the user. It helps in avoiding access leaks and, thereby, reducing the risk of data and information security breaches.

When we talk about the RBAC, a role is a collection of permissions based on different job functions across an organization. We mentioned earlier that RBAC is an approach, which means that it is designed to complement other existing security policies to strengthen the security landscape of the enterprise. In essence, RBAC provides a way to group different types of permissions across the enterprise and categorize them in order to effectively assign those permissions based on the job function of the user.

Groups and Roles - The Difference

One very important point is that there are differences between Groups and Roles. Groups are used to organize users that have the same level of permissions to perform a task. It may or may not be relevant to their job functions, whereas, roles are aligned to the job functions and are a group of access privileges to perform a specific job.

Attribute-Based Access Control (ABAC) an alternative to RBAC

Another approach to user security and permissions management is Attribute-Based Access Control (ABAC). ABAC seeks to match characteristics about the user (job function, job title) with the resources that the end-user needs to access to perform their duties. 

So far, this system hasn't gained much popularity due to the challenges and setup required to implement this system on a wide scale. 

How is Role-Based Access Control Helpful?

Periodic permission and access (entitlement) audits are a vital part of maintaining security within an organization. However, manual audits take an inordinate amount of time to accomplish and as a result, they aren't done as often as they should be.  RBAC streamlines audits by enforcing access consistently across the enterprise.

 Other benefits of Role-Based Access Control are: 

Compliance 

Role-Based Access Control helps organizations meet compliance regulations like the data protection and privacy mandates enforced by regional and local government bodies. Examples include:

  • HIPAA compliance for healthcare organizations
  • CCPA for large California organizations 
  • GDPR for organizations handling the private information of European Citizens 

Operational Efficiency 

Role-Based Access Control helps in improving and maximizing the operational efficiency of security actions. If access controls are assigned in a role-based approach they can be quickly and systemically changed across the enterprise. 

Increased Visibility 

Role-Based Access Control gives more visibility into who has access to what resources, thereby enforcing that the resources are accessed only by authorized users to perform their assigned tasks.

Reducing Operations Expenses 

Role-Based Access Control also helps in regulating and reducing the operational expenses (OpEx) as it works on the principle of least privileges and reduces the administrative and IT support personnel's tasks of manually managing the access permissions. They can now spend their time on more productive business tasks.

Best Practices for RBAC Implementations

best-practices-rbac-v1

RBAC implementation requires that organizations spend time thinking through how their internal processes operate and designing roles that fit the user functions.

What follows are the steps necessary to start doing this within your organization:

  1. Perform a system and software inventory - list all the resources within the enterprise that a user might need access to, including applications, software, hardware, and any other resource that is smartly managed (using smart cards, etc.) 
  2. Identify and list required roles - Analyze the current user permissions and based on that, create roles. It may be helpful to ask your help desk to compile a report on access requests from which you can find patterns of use. Be mindful to create high-level roles as too many micro-level roles can completely defeat the purpose of going through the Role-Based Access Control process. There may be common groups as well, where all the resources are mapped and have similar access levels, such as - email groups, print users groups, internet groups, etc.
  3. Map roles to resources - Once the roles have been created, map the roles to the resources for proper access management and visibility for the resource.
  4. Assign users to roles - Map the group of users having similar access levels to the newly created roles. As these roles are already mapped to the resources, the users mapped to the roles will automatically get access to the resources.
  5. Perform frequent access reviews - Working with Role-Based Access Control is not a one-time affair. It still requires that audits are performed and corrections made to keep roles in line with changing user needs. 

Azure Role-Based Access Control

gmsa-benefits-1

Azure Role-Based Access Control is the practical implementation of the abstract functionality we've been discussing so far. It helps administrators manage access to Azure resources and defines what exactly they can do within that resource. Azure RBAC is best thought of as an authorization system built on Azure Resource Manager (ARM) that helps in fine-grained access management.

The role assignment in azure has three key elements:

  1. Security Principal - The security principal represents a user, a group, a service principal, or a managed identity that requests and is given access to a resource.
  2. Role Definitions - A role has a group of permissions for different Azure resources that are assigned to the security principal. It generally defines the actions that can be performed on the resources.
  3. Scope - Scope usually is the resource to which the roles define access to along with the level of permissions for one or more roles.

In Azure, the scope can be defined at 4 levels. They include Management Groups, Subscription, Resource Group, or directly at the Resource level. One point to remember is that the scope has a parent-child relationship and that the permissions from the parent are inherited by the child resources. 

Azure includes several built-in roles that are pre-baked in Azure for our immediate use. They are based on the industry best practices and the way that Azure resources are structured. Azure also provides the compatibility to create custom RBAC roles based on our organizational requirements.

After the role has been defined and the scope has been mapped with the roles, role assignment is done to provide access to one or more security principles to the scope. If the access is to be removed for the security principal, the role assignment is revoked making it easier to manage permissions.

Working with Multiple role Assignment in Azure

There are cases where you would need to assign multiple roles to a user or a group. It is possible with Azure Role-Based Access Control as Azure RBAC is an additive approach, meaning that the permissions of the roles will overlap and the net effective permission is the sum of two different roles assigned to an identity.

Let's try to understand that with an example. A user 'A' has a 'Contributor' role assigned to him at the subscription level and the same user has a reader role on a Storage Account. The net resultant role of the user will be the 'Contributor' as it already encompasses the read access to the Storage Account.

Assigning User Roles using Azure Portal

To assign roles to other identities within Azure, you must have a role that has the write permissions on role assignment (Microsoft.Authorization/roleAssignments/write). For example - User Access Administrator or Owner.

Below are the steps to be followed for assigning roles to an identity from the Azure portal.

  1. Scope Identification
  2. Select Role
    1. Select the Access Control(IAM)
    2. Open role assignments page
    3. Select the appropriate role
  3. Select Identity and Assign Role
    1. Select the identity to be provided access
    2. Add conditions and assign roles

Scope Identification

Select the resource you wish to provide access to. For our lab purposes, we will provide role assignments at the subscription level

  1. Open Azure portal
  2. From the dashboard, click on the Azure subscription
    unnamed
  3. Select your subscription on which you wish to assign role.

unnamed-1

Select Role 

  1. Select Access Control (IAM) from the left-hand menu
    unnamed-2
  2. On the Access Control page, click on the 'Role Assignments'
    unnamed-3
  3. You can use this page to view the role assignments at the subscription level as we are working on the role assignment on the subscription

Select the appropriate role

  1. Click on the 'Add' button and then select the 'Add role assignment' option
    unnamed-4
  2. On the 'Add role assignment' page, select the role that you wish to give permission on. For the purpose of the lab, you can select the contributor role.

    You can also use the search box to search for the role by its name. Each role also shows its description to clarify the purpose it is designed for.
    unnamed-5

Select Identity and Assign Role

  1. After the role has been selected, select the 'Members' tab to add members to the role.
    unnamed-6
  2. On this screen, you can use a single user, a group, a service principal, or a managed identity as well. For the purpose of the demo, I will be choosing the 'user, group, or service principal' option and click on the 'Select Members' link.

    unnamed-7
  3. On the popup that appears, will display the names of all the users from which you can select one or more users. After you have selected the users, click on the 'Select' button.
    unnamed-8
  4. The selected users will be shown on the 'Add role assignment' page. You can then click on the 'Review + assign'' button at the bottom of the page or the 'Review + assign' tab at the top of the page.
    unnamed-9
  5. On the 'Review + assign' page, click on the 'Review + assign' button again.
    unnamed-10
  6. It will take a couple of minutes and the selected users will have the 'Contributor' role assigned at the subscription level.
    unnamed-11

The same process can be repeated to assign any role at the resource level as well.

Summary

Role-Based Access Control is a practical approach to handling the complexities of user permission management. 

This helps in not just minimizing the risks of information breaches and data leaks, but also helps in reducing the overall operational expenses of the organization as it reduces the manual effort of the administrative and IT service desk professionals.

Remember that Role-Based Access Control is not a one-stop security solution that can be used exclusively replacing all other security implementations to handle cybersecurity, rather it has to be used alongside other security implementations across the organization.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
6-prompts-you-don't-want-employees-putting-in-copilot
6 Prompts You Don't Want Employees Putting in Copilot
Discover what simple prompts could expose your company’s sensitive data in Microsoft Copilot.
generative-ai-security:-preparing-for-salesforce-einstein-copilot
Generative AI Security: Preparing for Salesforce Einstein Copilot
See how Salesforce Einstein Copilot’s security model works and the risks you must mitigate to ensure a safe and secure rollout.
dspm-buyer's-guide
DSPM Buyer's Guide
Understand the different types of DSPM solutions, avoid common pitfalls, and ask questions to ensure you purchase a data security solution that meets your unique requirements.
speed-data:-preparing-for-the-unknown-in-cybersecurity-with-ian-hill
Speed Data: Preparing for the Unknown in Cybersecurity With Ian Hill
Ian Hill, the Director of Information and Cybersecurity for Upp Telecommunications, offers his take on AI and the future of tech, shares his tricks for a good cyber defense, and explains why the best-laid plans of mice and security professionals often go astray.