BEST PRACTICES: A scalable approach to access control in RSA Archer

Data and information in GRC solutions is integral to an organization’s Risk Intelliegence strategy and should be well-protected. Role-based access control is an approach that’s often used to restrict system access to certain authorized users, and is adopted by most enterprises and implemented for IT and business systems.

In this document, Iceberg’s Zhao Tian outlines a role-based access control permission model for RSA Archer that can help simplify user access management for Archer admins.

For more information please contact us at info@icebergnetworks.com or call 855-595-0808 x261.

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Sign-up to our Risk Intelligence Newsletter for updates on new content, resources and events from the Iceberg team.

We promise to respect your time and inbox!

Thank you! Please check your email to confirm your subscription.