Role-Based Access Control (RBAC)
GW IT is implementing Role-Based Access Control (RBAC) to enhance security and compliance. RBAC is an access control model that grants permissions to specific roles within a school or department, rather than to individual users. These roles are defined based on job functions and the level of access required to fulfill job responsibilities. By assigning permissions to roles, we can ensure that users only have the access they need to perform their jobs, reducing the risk of unauthorized access to sensitive information.
Following the successful Spring 2024 pilot with Human Resource Management and Development (HR), we are taking a phased approach to expand the implementation of RBAC. We will engage our campus partners to communicate the initiative, establish timelines and ensure testing, adoption and compliance. Updates about the progress and provide additional details as information becomes available.
Project Phases
- Promote
- Introduces the concept and benefits of Role-Based Access Control (RBAC).
- Inventory
- Conduct an audit of current user access to identify any inconsistencies, redundant permissions, or potential security risks.
- Role Mining
- Analyze inventory data to identify common permission patterns and create roles that group similar permissions.
- Configure
- Assign the appropriate permissions to each defined role by configuring the system.
- Go Live
- Conduct a simulation phase to test user access and verify correct configuration, followed by a support phase after going live.
Project Status | - Complete | ||||
---|---|---|---|---|---|
Department/Program | Promote | Inventory | Role Mining | Configure | Go Live |
Advising |
|
|
|
|
|
Budget Office | |||||
Controller/Financial Reporting | |||||
Faculty Personnel | |||||
Financial Aid | |||||
Grad Enrollment Management | |||||
HRIS | |||||
International Student Office | |||||
IT | |||||
Law Admissions | |||||
Med Admissions | |||||
OGSAF | |||||
Registrar | |||||
Research OVPR, Pods, GCAS | |||||
Student Account | |||||
Student Employment | |||||
Under Grad Admissions |
RBAC in Action
RBAC Key Components
Roles
These are defined based on job functions within an organization. For example, roles could be “Admin,” “Editor,” “Viewer,” etc.
Permissions
These are the actions that can be performed within the system, such as “read,” “write,” “delete,” etc.
Users
These are the individuals who need access to the system. Each user is assigned one or more roles.
How it Works
Define Roles
Determine the different roles needed in the organization and what permissions each role should have.
Assign Permissions to Roles
Assign the necessary permissions to each role.
Assign Roles to Users
Assign users to the appropriate roles based on the level of data access required.
Example
Enabling role based access control for a document management system may include the following roles and permissions:
Admin: Can create, read, update, and delete any document.
Editor: Can create and update documents but cannot delete them.
Viewer: Can only read documents.
In this system, if a new employee joins as a content writer, they might be assigned the “Editor” role, giving them the permissions needed to do their job without granting unnecessary access.
Benefits & Applications of RBAC
Key advantages of RBAC is that it simplifies the management of user permissions. Instead of manually assigning permissions to each user, administrators can simply assign users to roles, and the system will automatically grant the appropriate permissions.
RBAC also ensures that access to sensitive information, including GW Restricted Data (e.g., PII, sensitive financial data), is granted only to individuals whose job responsibilities require it.
In addition to its benefits, the following examples illustrate the practical applications and impacts of RBAC:
- Improved User Experience: A new employee joins the university as a Financial Aid counselor. Instead of waiting for an administrator to manually grant them access to the necessary systems, their account is automatically assigned the permissions associated with the Financial Aid Counselor role, allowing them to start working immediately.
- Enhanced Security: A staff member attempts to access student financial records that they are not authorized to view. The RBAC system blocks the access attempt, as their role does not have permissions to view this sensitive data.
- Simplified Management: The university needs to update the permissions for all employees who work in student accounts. Instead of updating individual user accounts, the administrator can simply modify the permissions associated with the Student Account roles, and the changes will be applied automatically.
Questions & Feedback
- If you have questions or feedback about this change, please share them with us by submitting the technology feedback form, and a member of the project team will be in contact with you.