A role-based access control permission model in RSA Archer

RSA Archer

Data and information in GRC solutions is integral to an organization’s Risk Intelligence strategy and should be well-protected. Role-based access control is an approach that’s often used to restrict system access to certain authorized users, and is adopted by most enterprises and implemented for IT and business systems.

In this document, Iceberg’s Zhao Tian outlines a role-based access control permission model for RSA Archer that can help simplify user access management for Archer admins.

Download full article

Start your GRC journey.
We’ll be your trusted partner.

Start your journey