A role-based access control permission model in RSA Archer
RSA Archer
Data and information in GRC solutions is integral to an organization’s Risk Intelligence strategy and should be well-protected. Role-based access control is an approach that’s often used to restrict system access to certain authorized users, and is adopted by most enterprises and implemented for IT and business systems.
In this document, Iceberg’s Zhao Tian outlines a role-based access control permission model for RSA Archer that can help simplify user access management for Archer admins.