Tagged in

role-based access control

Rubrik -  - Role-Based Access Control Enhancements and Best Practices

Product

Role-Based Access Control Enhancements and Best Practices

The Rubrik Andes 5.2 release, now Generally Available, introduced a variety of capabilities to advance enterprise security, compliance, and resilience. One of our most significant enhancements is with our Role-Based Access Control (RBAC) capability, which is designed to help maximize operational efficiency, safeguard against unauthorized access, reduce admin and IT support work, and make it easier to meet audit requirements. Least privilege—the practice of assigning each user the precise amount of privileges to perform their jobs and nothing more—is one of the most fundamental security principles. With our new RBAC capabilities, you can now enforce least privilege and separation of duties policies and achieve all of the above benefits. What is new for RBAC? Andes 5.2 introduces the following three RBAC roles:  Custom Role  Each organization has different requirements and operational processes. Oftentimes, the pre-defined build-in roles won’t be specific enough. They either grant too few or too many privileges that each user needs to undertake. To resolve this problem, Andes 5.2 allows you to create custom roles that grant the precise privileges based on your users’ responsibilities at a more fine-grained level.   Infrastructure Administrator Role  This role is designed for IT personas who are responsible for setting up the…
Rubrik -  - Rubrik Cloud Data Management: Security by Design

General Tech

Rubrik Cloud Data Management: Security by Design

Since the beginning, Rubrik’s Cloud Data Management platform has been designed with security as one of its core principles. Our goal is to ensure that data is managed in a secure and responsible manner, independent of its location. This capability is growing more important with the changes to the General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018, for any organisation that processes or stores data from individuals in the EU. For companies that must comply with GDPR, security by design is imperative in data management. The regulation requires companies to use solutions in which data protection is designed into the development rather than added on at a later point. Requirements apply to on-prem and cloud environments, as well as to measurements that prevent employee-caused breaches. Data Management Designed for Protection Rubrik delivers end-to-end encryption across all environments while maintaining performance. It starts at the point of ingesting the data from your production systems. For both virtual and physical environments, we encrypt data in-flight to protect it from eavesdropping. Once the data arrives to the Rubrik cluster, customers can choose the method for encryption at-rest, either using software-based encryption or FIPS 140-2 Level 2 Certified hardware-based encryption. Rubrik also…