Competency
This competency highlights the key factors in establishing robust information access restrictions, as outlined in Annex A 8.3. Through four modules, participants will uncover strategies for implementing Role-Based Access Control, designing dynamic access policies, streamlining access request workflows, and conducting regular entitlement reviews.
5 Trainers
About
3,011 Students | Languages Available: Spanish, English, German, French
This comprehensive course introduces participants to key strategies in information access restriction, focusing on access models, policy implementation, request workflows, and auditing. It covers best practices for establishing secure and efficient access controls within an organization.
This course is perfect for:
Module 1
Module 2
Module 3
Module 4
To obtain a certification for this competency, you need to watch all the modules and pass the exam at the end.
ISO/IEC 27001 Annex A
Information Security Controls
Information Access Restriction
Role-Based Access Control
Access Policies
This video lesson introduces the concept of access control models, providing an overview of key models like Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Mandatory Access Control (MAC). Gain a thorough understanding of each model’s structure and application, highlighting how these frameworks manage permissions and restrict access within different organizational contexts. Discover the relevance of selecting an appropriate access control model to meet specific security and operational needs, ensuring a robust approach to safeguarding critical information and resources across the organization.
Cybersecurity and Information Security Specialist
Bevan Lane is a prominent figure in Information Security and IT Governance with over 25 years of global experience. Bevan is recognized for leading information security projects, assessments, and policy formulation, significantly advancing the field. Bevan has facilitated over 150 training sessions, workshops, and presentations at international forums, sharing critical insights with global professionals. His expertise includes incident response, investigations, and addressing complex IT security challenges for key clients. Renowned for his specialization in ISMS implementations, certification audits, and security consulting, Bevan is known for strategic thought leadership and creating client-specific solutions. His track record and commitment to excellence position him as a leading authority in evolving information security practices worldwide.