Attributes is the new role?

By Sandeep Chopra.

“Attributes” is the new Role?

In the last Gartner Identity and Access Summit in Nov 2013, Gregg Kreizmann, Research VP in Gartner, made a prediction that by 2020, 70% of all businesses will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from <5% today.

In Oct 2013, NIST published their report titled “Guide to Attribute-based Access Control Definition and Consideration”, which we discussed in an earlier blog. This is recognition that organizations, including the federal government, need to govern how information is shared across systems, applications, and organizations. more “Attributes is the new role?”

A Report From MS TechED 2013: Are We Moving Our Authorization Overhead to the Cloud?

By Mandy Pang.

I just got back from MS Tech Ed in New Orleans. The hot topic was obvious: Microsoft’s new cloud platform, Windows Azure.

I attended multiple sessions (such as this one), and a central message was how easy Azure makes it for IT organizations to move their resources and applications to the cloud. One reason is the flexibility Azure provides to allow organizations to choose which applications to move to the cloud, versus which ones to keep on premise. You can design an approach that works best for you, or even make the transition in strategic increments. more “A Report From MS TechED 2013: Are We Moving Our Authorization Overhead to the Cloud?”

Container-Based Controls versus Dynamic Authorization: The Difference in Windows Environments (Part 1 of 2)

By Sandeep Chopra.

If you are debating whether to upgrade to Windows Server 2012, plenty of articles describe its new security benefits (for example, see here and here). Fewer articles discuss the basic shift in Access Management this release can enable. To understand the potential benefits of one key feature, Dynamic Access Control, it’s useful to compare this approach with more well-known models of Access Management, such as ACLs and Security Groups. This blog is first in a series that compares how Access Management was handled in Windows environments prior to the 2012 release with what’s possible now. more “Container-Based Controls versus Dynamic Authorization: The Difference in Windows Environments (Part 1 of 2)”