Attribute-based access control (“ABAC” for short) has reached the point of mass adoption with respect to access control technologies. In fact, the National Cybersecurity Center of Excellence developed a reference design for ABAC that provides organizations “greater efficiency, flexibility, scalability security.” To ensure that those benefits are realized, however, it’s essential to establish best practice guidelines when it comes to implementing ABAC successfully.
ABAC can be instrumental in reducing enterprise risks such as insider threats, loss of customer data and personally identifiable information (PII), leakage of trade secrets and intellectual property, and fraud. The use of context in access decisions can also lead to substantial cost savings since ABAC systems enable more efficient policy management and regulatory compliance. Furthermore, organizations can continue to leverage much, if not all, of their previous investment in existing IT infrastructure. more “Words of Wisdom: How to Ensure a Successful ABAC Implementation”
When you’re driving your car, you view it as something completely protected. You’re driving it, and if you’ve maintained it, it’s going to likely drive as it should. I recently spoke with a friend who said he views his car as a ‘black box’; he drives it, but he relies on his mechanic to tell him if something is wrong with it. The unfortunate reality is that now, even while you’re driving, your car could potentially be taken over by a rogue hacker.
While it may sound like something out of a spy thriller or sci-fi novel, over the last few years, hackers have found numerous ways to hack into a vehicle, from taking over the on-board navigation system through an unsecured WiFi network designed to look like a public network, to hacking into a local mechanic’s diagnostic system then using that system to access the car’s on-board diagnostics. more “Could Your Car Be Hacked? It’s More Possible Than You Think.”
Many of us use cloud services like Box, Dropbox, Google Drive, and OneDrive to store our files and to share them with colleagues or friends. But, do you sometimes get a little nervous knowing that your files are out in the open, susceptible to evildoers searching for security vulnerabilities so they can pilfer confidential info? more “A Sensible Approach to DRM and File Sharing Services”
The General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason. It impacts companies not just in Europe but potentially anywhere in the world.
We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever been. Large multinational companies have offices throughout the globe. more “GDPR: A Lens into the Bigger Picture of Digital Transformation”
If you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts. It could very well be the biggest little secret you’ve never heard of with respect to data security. What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions are having a difficult time keeping pace. more “Why Dynamic Authorization Is a Big Deal in Data Security”
As corporate security, data sharing, and compliance requirements increase, managing access to customer data in Microsoft Dynamics CRM has become more important than ever. These changing requirements can result in increased administration overhead and complexity.
NextLabs Enforcer for Microsoft Dynamics helps simplify this management by extending the existing Dynamics security model through attribute based policies. more “Policy Based Security for Microsoft Dynamics CRM”
In our previous posts (Part 1) (Part 2), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. Now that we have ensured the data in SharePoint is secure, how do we extend that security beyond SharePoint?
Users who are authorized to access sensitive data in SharePoint can download that data and share it with anyone outside of SharePoint. The most common way to prevent this data from being shared with unauthorized users is through encryption and digital rights management. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 3”
In a previous post (Part 1), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. In this post we will review how we can use NextLabs Entitlement Manager for SharePoint to easily create a policy to address the example use case:
“As an example, a corporate security policy may state that only users located at offices in the United States can access documents in SharePoint with a classification of top secret. To accomplish this in SharePoint today would be a very manual process. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 2”