A scalable approach to access control in RSA Archer

Best Practices

Data and information in GRC solutions is integral to an organization’s Risk Intelliegence strategy and should be well-protected. Role-based access control is an approach that’s often used to restrict system access to certain authorized users, and is adopted by most enterprises and implemented for IT and business systems.

In this document, Iceberg’s Zhao Tian outlines a role-based access control permission model for RSA Archer that can help simplify user access management for Archer admins.

Download full article

Start your GRC journey.
We’ll be your trusted partner.

Start your journey