SlideShare a Scribd company logo
1
Boost Privacy Protections with
Attribute-Based Access Control
Taking the Next Step Beyond Role-Based Access Controls
Raoul Miller
Director, Content Strategy & Advisory
TEAM IM
raoul.miller@teamim.com
@ECM_Raoul
3
TEAM IM
• Content and unstructured data
specialists since 1999
• Oracle, M-Files, Microsoft,
Elasticsearch, HelloSign, Frevvo,
ABBYY, Smartlogic partners
• Operate in US, Canada, Australia
and New Zealand
• Advisory and Strategy practice is
one part of what we do.
4
© Raoul Miller
5
Agenda
• Different types of access
control
• Which attributes to use?
• Who should use ABAC?
• How to implement ABAC
• Some pros and cons
(© Raoul Miller)
6
A good programmer is
someone who always
looks both ways before
crossing a one-way
street.‘’
-- Doug Linder,
Author, Lawyer, Professor
Access Control
• “Selective Restriction of Access to a
Place or Resource”
• Authentication –Who are you?
• Authorization – What can you do?
• Many different models – most common:
• ACL
• RBAC
• ABAC
7
(© Raoul Miller)
(© Raoul Miller)
Role-Based Access Control
• Most common method for most
enterprise systems
• Person -> Role -> Permissions
• Usually integrated with directory and
groups
• More scalable than ACLs (may be
combined)
8
(© Raoul Miller)
Attribute–Based Access Control
• Evolved from RBAC
• Policy-based rather than static
• Next generation compared to RBAC
• Boolean logic (IF,THEN) in rules
9
(© Raoul Miller)
Components of ABAC
• PEP – Policy Enforcement Point
• Equivalent toWeb Gate
• PDP – Policy Decision Point
• Where requests are processed
• Returns a permit / deny
• PIP – Policy Information Point
• Bridges from PDP to external attribute
sources
10
(© Raoul Miller)
Which Attributes to Use?
• Subject attributes
• Clearance, age, role
• Action attributes
• Read, delete, view
• Object / resource attributes
• Object type, department, location, classification
• Contextual (environment) attributes
• Time, location, IP address, device
11
(© Raoul Miller)
Who Should Use ABAC?
• Defense / National Security
• Medical
• Financial
• Legal
• Anywhere that data security is key
• CMS
• ERP
• Database
12(© Raoul Miller)
How to Implement ABAC
• Buy a COTS product
• Axiomatics, PlainID, NextLabs, Symphonic
• Use XACML to integrate into solutions
• Web frameworks, middleware code
• Enable for certain applications
• Windows Server 2012
• Hadoop, Oracle
• Spring (expression-based access control)
13
(© Raoul Miller)
Some Pros and Cons of ABAC
• Complexity
• It’s a new thing and not standard
• Defining rules
• Adds data to audit trail
• Privacy
• Decision is allow/deny, data in PDP/PIP
• Consistency
14(© Raoul Miller)
Key Takeaways
15
• You should consider ABAC for
sensitive data or content
• Understanding the process of defining
and implementing ABAC
• Pros and cons
• There is overlap between RBAC and
ABAC
(© Raoul Miller)
Questions?
Raoul Miller
Director, Content Strategy
and Advisory
TEAM IM
raoul.miller@teamim.com
@ECM_Raoul (Twitter)

More Related Content

PPTX
Developing a privacy compliance program
PPTX
A simple guide for moving your content systems to the cloud
PPTX
Expertslive 2018 advanced data governance
PPTX
PPTX
GDPR project board deck (example)
PDF
0089-slk-Corp-20150210_lo
PDF
Norm Barber At-a-Glance 2015
PDF
AI-SDV 2021 Biomax
Developing a privacy compliance program
A simple guide for moving your content systems to the cloud
Expertslive 2018 advanced data governance
GDPR project board deck (example)
0089-slk-Corp-20150210_lo
Norm Barber At-a-Glance 2015
AI-SDV 2021 Biomax

Similar to Boost privacy protections with attribute-based access control (20)

PDF
Attribute based access control
PPTX
Attribute-Based Access Control: Fine-Grained Security Management
PPTX
Abac and the evolution of access control
PPT
Attribute Based Access Control
PPTX
The day when role based access control disappears
PPTX
Attribute-Based Access Control (ABAC)...
PPTX
smu_abac_150410.pptx
PPTX
What’s Happening in Information Risk Management
PPTX
Authorization Pattern.pptx power point s
PPT
Generalized attribute centric access control
PDF
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
PDF
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
PPTX
Attribute based access control
PPTX
009 Authentication and Access Control.pptx
PDF
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
PPTX
Top Ten Reasons Why Developers Don't Adopt ABAC
PDF
Access Control Models: Controlling Resource Authorization
PPTX
Do you have a business case for Attribute Based Access Control (ABAC)?
PPTX
Do you have a business case for Attribute Based Access Control (ABAC)?
PPTX
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Attribute based access control
Attribute-Based Access Control: Fine-Grained Security Management
Abac and the evolution of access control
Attribute Based Access Control
The day when role based access control disappears
Attribute-Based Access Control (ABAC)...
smu_abac_150410.pptx
What’s Happening in Information Risk Management
Authorization Pattern.pptx power point s
Generalized attribute centric access control
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL
Attribute based access control
009 Authentication and Access Control.pptx
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...
Top Ten Reasons Why Developers Don't Adopt ABAC
Access Control Models: Controlling Resource Authorization
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Ad

More from Raoul Miller (6)

PPTX
Multitenancy on OCI - FinalRM.pptx
PDF
GSA Presentation - MILLER 251-4.pdf
PPTX
Choosing a new platform for records or document management
PPTX
WebCenter as a Cloud App on Exalogic
PPTX
Email Management Using Oracle WebCenter Content Records
PPTX
Repository Scalability - comparing SharePoint 2010 with Oracle UCM 11g
Multitenancy on OCI - FinalRM.pptx
GSA Presentation - MILLER 251-4.pdf
Choosing a new platform for records or document management
WebCenter as a Cloud App on Exalogic
Email Management Using Oracle WebCenter Content Records
Repository Scalability - comparing SharePoint 2010 with Oracle UCM 11g
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks

Boost privacy protections with attribute-based access control

  • 1. 1
  • 2. Boost Privacy Protections with Attribute-Based Access Control Taking the Next Step Beyond Role-Based Access Controls
  • 3. Raoul Miller Director, Content Strategy & Advisory TEAM IM raoul.miller@teamim.com @ECM_Raoul 3
  • 4. TEAM IM • Content and unstructured data specialists since 1999 • Oracle, M-Files, Microsoft, Elasticsearch, HelloSign, Frevvo, ABBYY, Smartlogic partners • Operate in US, Canada, Australia and New Zealand • Advisory and Strategy practice is one part of what we do. 4 © Raoul Miller
  • 5. 5 Agenda • Different types of access control • Which attributes to use? • Who should use ABAC? • How to implement ABAC • Some pros and cons (© Raoul Miller)
  • 6. 6 A good programmer is someone who always looks both ways before crossing a one-way street.‘’ -- Doug Linder, Author, Lawyer, Professor
  • 7. Access Control • “Selective Restriction of Access to a Place or Resource” • Authentication –Who are you? • Authorization – What can you do? • Many different models – most common: • ACL • RBAC • ABAC 7 (© Raoul Miller) (© Raoul Miller)
  • 8. Role-Based Access Control • Most common method for most enterprise systems • Person -> Role -> Permissions • Usually integrated with directory and groups • More scalable than ACLs (may be combined) 8 (© Raoul Miller)
  • 9. Attribute–Based Access Control • Evolved from RBAC • Policy-based rather than static • Next generation compared to RBAC • Boolean logic (IF,THEN) in rules 9 (© Raoul Miller)
  • 10. Components of ABAC • PEP – Policy Enforcement Point • Equivalent toWeb Gate • PDP – Policy Decision Point • Where requests are processed • Returns a permit / deny • PIP – Policy Information Point • Bridges from PDP to external attribute sources 10 (© Raoul Miller)
  • 11. Which Attributes to Use? • Subject attributes • Clearance, age, role • Action attributes • Read, delete, view • Object / resource attributes • Object type, department, location, classification • Contextual (environment) attributes • Time, location, IP address, device 11 (© Raoul Miller)
  • 12. Who Should Use ABAC? • Defense / National Security • Medical • Financial • Legal • Anywhere that data security is key • CMS • ERP • Database 12(© Raoul Miller)
  • 13. How to Implement ABAC • Buy a COTS product • Axiomatics, PlainID, NextLabs, Symphonic • Use XACML to integrate into solutions • Web frameworks, middleware code • Enable for certain applications • Windows Server 2012 • Hadoop, Oracle • Spring (expression-based access control) 13 (© Raoul Miller)
  • 14. Some Pros and Cons of ABAC • Complexity • It’s a new thing and not standard • Defining rules • Adds data to audit trail • Privacy • Decision is allow/deny, data in PDP/PIP • Consistency 14(© Raoul Miller)
  • 15. Key Takeaways 15 • You should consider ABAC for sensitive data or content • Understanding the process of defining and implementing ABAC • Pros and cons • There is overlap between RBAC and ABAC (© Raoul Miller)
  • 16. Questions? Raoul Miller Director, Content Strategy and Advisory TEAM IM raoul.miller@teamim.com @ECM_Raoul (Twitter)