1 The Challenge
Amongst the key challenges within IAM (Identity & Access Management) is access control and enforcement, the “access” part in the term. Enforcing the least privilege principle and restricting access following the need-to-know concept is challenging. Static entitlements are the common approach. These define per application who has access to what. They are stored at the application level, for instance, as ACLs (Access Control Lists). IAM tools can manage and change these entitlements. However, keeping track of changes locally made in connected target systems is challenging. Also, managing entitlements is complex, with the entitlement structures within applications being complex and manifold, and the need for managing access for many users across many applications. RBAC (Role-Based Access Control) has long been a solution, but it brought challenges and complexity. PBAM (Policy-Based Access Management), also known as PBAC (Policy-Based Access Control), provides a leaner approach to entitlement management by shifting away from static entitlements.
There are various challenges that organizations are facing for managing access entitlements across their IT landscape:
1.1 Complexity of Role Management
Role Management in RBAC has proven to be a daunting task. RBAC is commonly used to reduce the complexity of mapping entitlements to persons by using roles as an intermediary layer for grouping. Defining a role model is complex. There are various approaches for such models with different tiers of roles. Figuring out which model fits to an organization and implementing it takes time and requires significant effort. It becomes even more complex to define the roles and their relationships, from technical IT roles that map to system-level entitlements, to business roles that map to business processes and business activities. Organizational changes can trigger massive change requests for role models, adding to the effort in maintaining a RBAC model. Also, in some organizations, the number of roles exceeds the number of users, indicating overly complex role models.