• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Email and Collaboration Security
      • Managed Firewall

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Fabric
      • Microsoft Funding Opportunities

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

Restructuring Data Access Controls with Identity and Access Management (IAM)

  • Written by: Dave Nelson
  • July 19, 2017
Animated Person on Computer with Role Based Access Controls Text

In the previous blog post Remember to Review Your Data Loss Prevention Policies, I mentioned a few things to consider before purchasing data loss prevention (DLP) products. One of which was regarding restructuring data access controls. To add a little more context to this suggestion, we will discuss some ways to handle it in this article.

The restructuring of controls can be accomplished through Identity and Access Management (IAM), which enables the right individuals to access the right resources at the right times and for the right reasons. Most organizations have tools and processes in place to control access to data. However, as employees move about the company, their access continues to grow, albeit unnecessarily. With each new role, position or promotion, new access is granted but old access is forgotten about and never reviewed to ensure appropriateness.

Limiting Access Creep with Role Based Access Controls (RBAC)

This type of access creep undermines the efforts in deploying appropriate tools that limit access in the first place. That is why it is so important for organizations to remove access that is no longer needed. To help with this challenge, organization can utilize Role Based Access Controls (RBAC). When implemented correctly and followed exclusively, RBAC is great at limiting access creep.

With RBAC in place, when a user is moved into a role, they receive only the access needed for that role. All other existing access is stripped away. Using this method requires organizations to think about each role and the responsibilities of those roles. The important thing about this approach is that organizations must be intentional about how they assign data access controls.

Sticking to the RBAC Model

Defining the roles that guide RBAC can be time consuming and challenging. If roles are not well-defined, access may either be too broad or too narrow. In these instances, administrators may find themselves struggling to decide what to do with employees who have unique roles and there becomes a tendency to grant access outside of a predefined role, which invalidates the entire model. Organizations must remain vigilant about strictly defining roles and abiding by the RBAC model.

Reviewing and Updating Access Controls

In addition to the importance of the initial role creation, access controls must be continuously reviewed and updated based on the needs of the organization. Business unit leadership should be involved in the periodic certification of access for their team members. This ensures that the need for access to data is still valid based on the current business requirements.

The goal is to encourage organizations to take a close look at their access control model and find ways to improve it. In many cases new technology isn't even required. It may be as simple as implementing a process that identifies when an adjustment to access is required. The return on investment in these situations is exponential.

Related Content

IAM – Identity and Access Management: Maintaining User Access & Its Importance to Information Security

Identity Access Management (IAM) solutions help enable proper provisioning to reduce the risk associated with an account becoming compromised.

Learn More »
Two rows of blue and purple marshmallow Peeps with tape covering their beaks. This indicates that NAC Authentication method shouldn't be PEAP, but rather the more secure EAP-TLS.

Your NAC Shouldn’t Make a PEAP: EAP-TLS Is the Better Authentication Solution

Discover why EAP-TLS is the superior authentication method for NAC solutions like ISE and ClearPass over PEAP. Enhance your network security today with HBS.

Explore More »
Data Flow Diagram

Why You Need a Data Flow Diagram (DFD)—and How to Create One

Data flow diagrams (DFDs) reveal risks, simplify complex systems, and enhance security. We’ll show you step-by-step guidance so you can create your own DFD.

Read More »
  • Data Safety, Identity Access Management
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
©2026 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.