Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a formal cybersecurity model that restricts system access through organizational roles rather than individual permissions, reducing administrative complexity while improving security scalability. RBAC assigns permissions to roles that represent job functions, and users are granted access by being assigned to appropriate roles.

How RBAC Works: Organizations create roles representing specific job functions or responsibilities, bundling together all permissions needed for that position into a single, reusable package. When employees join the organization or change positions, administrators assign them roles based on their job requirements, instantly granting all associated permissions.

Key Components of RBAC

Policy Administration Point (PAP): Where security policies are created, managed, and stored

Policy Decision Point (PDP): Evaluates access requests against defined policies to make authorization decisions

Policy Enforcement Point (PEP): Intercepts and enforces access control decisions on resources

Policy Information Point (PIP): Provides attribute data needed for policy evaluation

RBAC Models

Core RBAC: Establishes the fundamental architecture through distinct entities—users, roles, permissions, and sessions—where each user is assigned one or more roles and each role carries specific permissions.

Hierarchical RBAC: Introduces role inheritance that mirrors organizational structures, where senior roles automatically inherit permissions from subordinate positions, reducing administrative overhead.

Constrained RBAC: Adds separation of duty constraints to prevent dangerous permission combinations that could enable fraud or abuse.

Benefits of RBAC

Simplified administration through role-based permission management

Consistent access control aligned with organizational structure

Easier audit and compliance reporting

Reduced risk from excessive permissions and privilege creep

Faster onboarding and offboarding through role assignment and removal

Pangratis implements RBAC within its platform to ensure security teams have appropriate access to threat investigation tools and sensitive data based on their organizational roles and responsibilities.

Account takeover is easier than you think

Behavioral AI monitors authentication patterns and flags compromised accounts in real time.

Protect your accounts