CYB 200 SNHU Computer Science Role Based Access Control Matrix Paper

Overview

In this exercise, you will develop a role-based access control (RBAC) matrix for user access control. RBAC matrices, as a security architecture concept, are a way of representing access control strategies visually. They help the practitioner ensure that the access control strategy aligns with the specific access control objectives. Matrices also help show when access controls may conflict with job roles and responsibilities. When you are completing this type of task, there are a few questions you should always be thinking about:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Who gets to log into the system?
  • Who gets to view what?
  • What kind of data are you dealing with (basic data vs. information subject to privacy controls)?
  • Who gets to add or delete? Who is view-only?
  • Who should not have permission?
  • Scenario

    You are a security analyst for a healthcare firm assigned to create an RBAC matrix for a new software-as-a-service (SaaS) application for managing patient medical files. There are six individuals who have roles within the system and need varying levels of access to the medical patient software. Your objectives are to set up the RBAC matrix to:

  • Ensure individuals have access to necessary information for their job role
  • Maintain patient privacy by adhering to the Fundamental Security Design Principle of least privilege (i.e., business need-to-know)
  • The following SaaS application parameters need to be determined:

  • Access to patient information
  • Access to employee information
  • Access to the SaaS
  • Access to backup logs
  • See the User Job Roles and Characteristics table below for information on the users, their roles in the organization, and their job descriptions.

  • UsersJob RolesJob Characteristics NormanRemote call-center employee
  • Has the ability to log into the medical SaaS as an employee, and has remote access to employee machines for purpose of fixing or diagnosing computer issues
  • Has the ability to create user accounts and assign passwords
  • Has no right to view patient information

    Save Time On Research and Writing
    Hire a Pro to Write You a 100% Plagiarism-Free Paper.
    Get My Paper

    Has the ability to view the backup logs for important system information

    RyheadSales representative for the healthcare firm

    Has access to the software but only for showing potential new customers

    Has the ability to create dummy user accounts for demo purposes

    Has no ability to modify any patient information, and can only show screens for demo purposes

    Has no access to the backup logs

    SimoneHR representative for the healthcare firm

    Has the ability to log into the system

    Has no abilities with user accounts

    Has access to the software and employee records but should have no access to patient information

    Has no access to the backup logs

    JanetApplication administrator for the SaaS application

    Has full access to software, has the ability to change or modify settings in the system as needed, and has the ability to provide an override code

    Has the ability to view, create, modify, and delete user accounts

    Has no rights to change patient information

  • Has the ability to view, modify, and delete backup logs for the SaaS
  • DaleNurse
  • Has access to the system for patient information.
  • Has no abilities with user accounts.
  • Has the ability to view, create, and modify patient information, but does not have the right to delete patient information without an override code

    Has no access to backup logs

    EthanAuditor

    Has the ability to log into the system but can only view information

    Has no abilities with user accounts

    Has no ability to create, modify, or delete patient information

    Has the ability to view backup logs

    Prompt

  • RBAC Matrix: Populate the RBAC matrix in the Module Four Activity Template using one or more of the necessary actions (view, create, modify, delete, none).
  • Essential Questions: Answer the following short response questions based on your populated table in the template:What changes could be made to user roles through implementation of least privilege to better support that security design principle? (Hint: Refer to the characteristics in the scenario table above, and consider the characteristics that may be contradictory.)What is the importance of this tool to you as a security analyst in managing and protecting the environment? Provide an example. 

    Order a unique copy of this paper

    600 words
    We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
    Total price:
    $26
    Top Academic Writers Ready to Help
    with Your Research Proposal

    Order your essay today and save 25% with the discount code GREEN