<aside>

RABAC | Role-Attribute Based Access Control

A tool that provides an advanced security model enhancing traditional Role-Based Access Control (RBAC) by integrating dynamic attribute-based policies.

</aside>

<aside>

RABAC is particularly valuable for:

<aside>

Key benefits of RABAC include


Enhances Security

Flexibility

Compliance Support

Operational Efficiency

RABAC enhances security by combining roles and attributes, ensuring fine-grained access control while minimising unauthorised access risks.


The framework can adapt to complex organisational structures and evolving security requirements through dynamic attribute evaluation.


RABAC helps organisations meet regulatory requirements by maintaining detailed access control records and enforcing consistent security policies.


Streamlines access management by addressing permission assignments based on predefined roles and attributes.

</aside>

Application in Company Name

At Company Name, RABAC serves as the cornerstone of our access control strategy, ensuring that sensitive information and resources are protected while maintaining operational efficiency.

1. Role Hierarchy Diagram

graph TD
    MD["Managing Director (L1)"] --> OD["Director of ... (L2)"]
    MD --> TD["Director. of ... (L2)"]
    OD --> HC["Head of ... (L3)"]
    OD --> HD["Head of ... (L3)"]
    TD --> DR["Data Research (L4)"]
    TD --> DC["Developer Contractors (L5)"]

Organisational Structure

L1: Managing Director: x name

L2: Director of … : x name

L3: Head of … : x name

L3: Head of … : x name

L2: Director of … : x name

L4: Data Research: x name

L5: Developer Contractor: x name

<aside>

! Update the role Hierarchy Diagram


Click “Preview” drop down and select “Code”. Replace/Add new lines according to your own use case.

</aside>

2. Data Classification

Company Name handles the following types of data.

This grouping is not exhaustive, as additional data types may be added to any of the categories in the future.

<aside> <img src="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" alt="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" width="40px" />

Intellectual Property | Critical Sensitivity


→ Product designs, architecture and blueprints

→ Research methodologies

→ Proprietary algorithms

→ Innovation documentation

</aside>

<aside> <img src="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" alt="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" width="40px" />

Customer Data | High Sensitivity

→ Client contact information

→ Project requirements and specifications

→ Client feedback and communications

→ Service agreements and contracts

</aside>

<aside> <img src="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" alt="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" width="40px" />

Business Data | High Sensitivity


→ Board meeting confidential minutes and strategic decisions

→ Shareholder agreements and communications

→ Executive compensation details

→ Strategic partnership negotiations

</aside>

<aside> <img src="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" alt="notion://custom_emoji/9966c6f3-e1b4-4447-8fba-9a26e67fb5b9/14e63c91-1662-80f5-9777-007a4dc3dfc8" width="40px" />

</aside>

Company Name classifies data into four sensitivity levels, each with specific access requirements based on organisational roles

graph TD
    subgraph "Data Sensitivity Classification"
    CS["Critical Sensitivity"] --> CS1["Intellectual property and proprietary information essential to competitive advantage"]
    HS["High Sensitivity"] --> HS1["Valuable business and customer information that could significantly impact operations or reputation"]
    MS["Medium Sensitivity"] --> MS1["Operational data important for day-to-day activities requiring protected but broader access"]
    LS["Low Sensitivity"] --> LS1["General administrative information with minimal disclosure risk but requiring basic security"]
    end
    
    style CS fill:#ff0000,color:white
    style HS fill:#ff8c00,color:white
    style MS fill:#ffff00,color:black
    style LS fill:#00ff00,color:black

3. Access Control Matrix

| --- | --- | --- | --- | --- | --- |