Role-Based Developer Security Training

Role-based security or role-based access control (RBAC) is used in software applications to restrict user access to the system and individual system features. Training options for developers of RBAC vary depending upon the requirements of the development project.
  1. Operating System

    • RBAC in some form has been integrated into many operating systems (OS). For example, Microsoft's .net framework makes information about user roles based on Windows accounts available to the current thread. Sun Solaris 8 and higher integrates an RBAC authorization system based on least privilege.

    Industry Requirements

    • Software development requirements for RBAC can vary depending upon the industry for which your software is targeted. For example, to comply with legal or certification requirements, such as the Sarbanes-Oxley Act, your application may have specific requirements regarding the tracking of which users completed certain tasks, such as modifying a record.

    Training Options

    • Training in role-based security can be provided within an overall security training module in a more comprehensive course, such as the latest release of Microsoft's .net framework. You can also find code examples and Webinars on the Internet that focus on general application security or security specific to the OS, programming language and industry with which you are working.

Learnify Hub © www.0685.com All Rights Reserved