What Is Role-Based Access Control?
Role-based access control (RBAC) is an access management approach where permissions are assigned to defined roles rather than individual users. Users inherit permissions by being assigned to roles that match their job functions, enforcing the principle of least privilege at scale.
For compliance-driven organisations, RBAC is a foundational control required by ISO 27001, SOC 2, NIS2, and DORA. Auditors examine role definitions, assignment processes, access reviews, and separation of duties enforcement.
RBAC Components
| Component | Description | Example |
|---|
| Users | Individuals who need access to systems | Employees, contractors, service accounts |
| Roles | Named collections of permissions based on job functions | Finance Analyst, Security Admin, Developer |
| Permissions | Specific actions allowed on specific resources | Read financial reports, deploy to production |
| Role assignments | Mapping of users to roles | Jane Smith → Finance Analyst |
| Role hierarchy | Parent-child relationships between roles | Manager inherits all Analyst permissions |
| Constraints | Rules limiting role assignments | SoD: cannot hold both Requester and Approver |
Access Control Models Compared
| Feature | RBAC | ABAC | ACL |
|---|
| Permission basis | Job role | User/resource/environment attributes | Per-resource user list |
| Scalability | High (roles scale with org) | Very high (policy-based) | Low (per-resource management) |
| Flexibility | Moderate | Very high | Low |
| Complexity | Moderate | High | Low |
| Best for | Stable organisational structures | Dynamic, context-aware policies | Simple resource-level access |
| Audit clarity | High (role-based visibility) | Moderate (policy complexity) | Low (distributed across resources) |
Role Design Principles
| Principle | Description | Implementation |
|---|
| Least privilege | Minimum permissions for job function | Start with zero access, add only what is needed |
| Separation of duties | Split critical functions across roles | Define mutually exclusive role pairs |
| Role hierarchy | Inheritance reduces duplication | Parent roles contain shared permissions |
| Job function alignment | Roles mirror organisational structure | Map roles to job descriptions and departments |
| Standard naming | Consistent, descriptive role names | Department-Function-Level (e.g., Finance-Analyst-Senior) |
| Regular review | Roles evolve with the organisation | Quarterly role reviews, annual access certifications |
Access Review Framework
| Review Type | Frequency | Scope | Reviewer |
|---|
| Privileged access | Quarterly | Admin and elevated roles | Security team + management |
| Standard access | Semi-annually | All user role assignments | Direct managers |
| Application access | Annually | Application-specific permissions | Application owners |
| Service accounts | Quarterly | Non-human identities | IT operations + security |
| Third-party access | Quarterly | Vendor and contractor access | Vendor managers + security |
Compliance Requirements
Framework Mapping
| Requirement | ISO 27001 | SOC 2 | NIS2 | DORA |
|---|
| Access control policy | A.5.15 | CC6.1 | Art. 21(2)(i) | Art. 9(4)(c) |
| Role-based access | A.5.15 | CC6.3 | Art. 21(2)(i) | Art. 9(4)(c) |
| Privileged access management | A.8.2 | CC6.1 | Art. 21(2)(i) | Art. 9(4)(c) |
| Separation of duties | A.5.3 | CC6.1 | Art. 21(2)(i) | Art. 9(4) |
| Access reviews | A.5.18 | CC6.2 | Art. 21(2)(i) | Art. 9(4)(c) |
Audit Evidence
| Evidence Type | Description | Framework |
|---|
| Access control policy | Documented RBAC policy with least privilege requirements | All frameworks |
| Role definitions | Complete list of roles with associated permissions | All frameworks |
| Role assignment records | Documentation of user-to-role mappings | All frameworks |
| Access review reports | Evidence of regular access certification and remediation | All frameworks |
| SoD conflict reports | Evidence of separation of duties enforcement | All frameworks |
| Joiner/mover/leaver process | Documented access lifecycle management | All frameworks |
| Privileged access logs | Audit trail of privileged role usage | ISO 27001, SOC 2 |
Common Mistakes
| Mistake | Risk | Fix |
|---|
| Over-permissive roles | Users have access beyond job requirements | Design roles with minimum necessary permissions |
| No regular access reviews | Privilege creep accumulates over time | Implement quarterly reviews for privileged, semi-annual for standard |
| Role explosion | Too many roles become unmanageable | Use role hierarchy and ABAC for dynamic policies |
| No separation of duties | Single user can perform critical end-to-end processes | Define and enforce mutually exclusive role constraints |
| Shared accounts | No accountability, audit trail gaps | Eliminate shared accounts, use individual identities |
| No offboarding process | Former employees retain access | Automated deprovisioning tied to HR systems |
How Orbiq Supports RBAC Compliance
Orbiq helps you demonstrate access control compliance:
- Evidence collection — Centralise access policies, role definitions, and review reports
- Continuous monitoring — Track access review completion and privileged access usage
- Trust Center — Share your access control posture via your Trust Center
- Compliance mapping — Map RBAC controls to ISO 27001, SOC 2, NIS2, and DORA
- Audit readiness — Pre-built evidence packages for auditor review
Further Reading