首页> 外文会议>CIGRE Lisbon Symposium >Role-Based Access Control – Potentially a Management Nightmare
【24h】

Role-Based Access Control – Potentially a Management Nightmare

机译:基于角色的访问控制–潜在的管理梦Night

获取原文
获取原文并翻译 | 示例

摘要

Almost all cybersecurity standards, recommended practices and guidelines require or recommend the need tornimplement role-based access control (RBAC) in configuring and maintaining electrical power utility (EPU)rnintelligent electronic devices. Good in theory, but JWG B5-D2.46 discovered significant management challengesrnto effectively administer a highly distributed schema for vetting protection and control access privileges and usernprivileges in a timely manner. A summary of JWG’s findings is discussed in this paper. A world-wide survey ofrnEPU protection and control (P&C) engineers helped JWG rank the challenges they faced to apply and managerncybersecurity solutions – RBAC management was high on the list. Further analysis by the JWG identified therncore issues of trust in the vetting process for employees, suppliers and partners. Maintaining a coherent databasernof access and use privileges in this heterogeneous environment proved to be labor intensive and not timely to thernrapidly changing roles of P&C engineers and field technicians. System dynamic modeling highlighted theserndeficiencies and provides the basis for JWG’s recommended improvements to effectively administer RBAC. Arnsummary of these recommendations is discussed in this paper.
机译:几乎所有网络安全标准,建议的实践和指南都要求或建议在配置和维护电力公用事业(EPU)智能电子设备时实施基于角色的访问控制(RBAC)。从理论上讲很好,但是JWG B5-D2.46发现了重大的管理挑战,即如何有效地管理高度分布式的架构以进行审查保护并及时控制访问特权和用户特权。本文讨论了JWG的发现摘要。对EPU保护和控制(P&C)工程师进行的全球调查帮助JWG对他们在应用和管理安全性解决方案方面面临的挑战进行了排名-RBAC管理在榜单上位居前列。 JWG的进一步分析确定了员工,供应商和合作伙伴在审核过程中信任的核心问题。在这种异构环境中维护一致的数据库访问和使用特权非常耗费人力,而且对于及时改变P&C工程师和现场技术人员的角色来说并不及时。系统动态建模突出了这些不足之处,并为JWG建议的改进以有效管理RBAC提供了基础。本文讨论了这些建议的摘要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号