The roles that are needed to run Riordan Manufacturing and the value of separating the duties in the organization should be laid out in writing. Separating the duties will be covered in the following paragraphs. How roles and their use to segregate the data and access system access needs of Riordan employees will be covered as well. Role-based access control systems (RBAC) are the best way for Riordan to segregate duties and use roles to segregate data and system access will be explained in more detail throughout the following paragraphs. Riordan has a need to control what information employees have access and what the public can access. Loss of valuable information can be controlled by RBAC systems by adding or deleting someone’s access to a particular role in Riordan’s infrastructure. Controlling user access will be very beneficial in Riordan’s day-to-day business practice to control what information is shared and to keep valuable data safe in the confines of Riordan.
Roles at Riordan Riordan is in need of becoming more secure with vital information and this can be done by controlling user access to much of the information and technology. Separation of duties in the information technology (IT) world is best explained by the separating of IT and users. This can be done grouping them or assigning them to roles. At the administration level IT and end users can fall into the same group. An example would be Human Resources (HR), Accounting, and Security departments. Roles can set what level of system access that the user and the user group are allowed to have. Roles will also set what permissions the user has on the computer he or she use, servers and the databases. Roles for the administrative staff will not grant them access to every system or any other important resource available to Riordan staff. Senior management and IT staff could have access to all systems if decided upon. The use of roles provides an accurate way to separate duties in the most effective way and does not allow users inappropriate access to the wrong information or systems. Establishing the separation of duties using roles will prevent and deter theft and wrongful processing on the employees part. The value that using roles to limit access to vital systems used to run and maintain Riordan’s manufacturing process every day could be based on the value of the information and process’s that Riordan could lose. Assigning employees/users to the roles that allow them access to the processes of their everyday job will help to track the users if something were to go wrong. Using the role-based access control (RBAC) system will help to assign these roles, add or delete users, and add all-around security of Riordan’s vital information and systems.
RBAC systems according to Stallings, W., and Brown, L. (2012),” Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to
Users’ in given roles.” Using RBAC will match users with roles according to the access that they are given on the system. By doing this, limits are put on users to keep a user from possessing too much access. Users should not have unlimited access to the system. If a user has too much access it leads to accidents and loss of information theft because of the user. Disgruntled employees who have had too much access to multiple systems can cause major harm to an enterprise. Riordan having multiple locations and having approximately 550 employees must control access to the multiple systems of Riordan. RBAC will create control over the users/employees’ who make up Riordan’s foot print in the United States and China Apollo Group, Inc. (2013). According to Stallings, W., & Brown, L. (2012), “Administrative functions provide the capability to create, delete, and maintain RBAC elements and relations.” Riordan also has issues with users going to or from business partner networks. If Riordan uses RABC users can