Recall & Review
beginner
What is Role-based Access Control (RBAC)?
RBAC is a method of restricting system access to authorized users based on their roles within an organization. It assigns permissions to roles rather than individuals.
Click to reveal answer
beginner
Name the three main components of RBAC.
The three main components are: Roles, Permissions, and Users. Roles group permissions, and users are assigned to roles.
Click to reveal answer
intermediate
How does RBAC improve security compared to assigning permissions directly to users?
RBAC simplifies management by assigning permissions to roles, reducing errors, and ensuring users only have access needed for their job, which lowers security risks.
Click to reveal answer
beginner
What is the principle of least privilege in RBAC?
It means users get only the minimum permissions necessary to perform their tasks, reducing the chance of misuse or accidental damage.
Click to reveal answer
beginner
Give an example of a role in RBAC and the kind of permissions it might have.
Example: A 'Manager' role might have permissions to approve requests, view reports, and manage team members, but not to change system settings.
Click to reveal answer
What does RBAC primarily use to control access?
✗ Incorrect
RBAC controls access by assigning permissions to roles, and users get access based on their assigned roles.
Which of the following is NOT a component of RBAC?
✗ Incorrect
Encryption keys are unrelated to RBAC components, which are roles, permissions, and users.
What principle does RBAC help enforce by limiting user permissions?
✗ Incorrect
RBAC supports the principle of least privilege by giving users only the permissions they need.
In RBAC, who is assigned to roles?
✗ Incorrect
Users are assigned to roles, which have specific permissions.
Why is RBAC easier to manage than assigning permissions directly to users?
✗ Incorrect
Grouping permissions into roles simplifies management and reduces errors.
Explain how Role-based Access Control (RBAC) works and why it is useful in managing system security.
Think about how assigning permissions to roles helps control user access.
You got /5 concepts.
Describe the principle of least privilege and how RBAC supports this principle.
Consider why users should only have the permissions they need.
You got /3 concepts.