Using Helios as Policy Information Point

Executive summary In this document, we have explored the possibilities of combining Axiomatics attribute-based access control (ABAC) solution with Helios as a policy information point (PIP). ABAC allows organizations to meet a broad set of regulatory requirements by dynamically evaluating authorization information at runtime, providing fine-grained access control. Helios offers a comprehensive platform for implementing […]

The Critical Importance of Data Governance

Abstract In today’s data-centric environment, organizations are increasingly dependent on data for decision-making, operations, and competitive advantage. As the volume, velocity, and variety of data continue to escalate, so does the complexity of managing and securing this data. This article explores the vital role that data governance plays in maintaining and enhancing information security. Effective […]

White Paper: Security Information Governance

Executive summary */BAC refers to the domain of attribute-based access control that enables organizations to meet a broad set of regulatory requirements using an access control where authorization is based on information dynamically evaluated at runtime. Before the */BAC revolution, organizations statically assigned permissions and entitlements to users and stored them in a common, central […]

Taming Attribute Chaos in ABAC: NIST Framework Compliance with Helios

Attribute-Based Access Control (ABAC) is a powerful and flexible access control model that can greatly improve an organization’s security posture. According to the National Institute of Standards and Technology (NIST) framework, implementing ABAC solutions involves addressing various challenges related to attribute sources. One common issue organizations face is the inconsistent naming of the same attribute […]

Security Information Governance

In many organizations the urge or need for more control over information is rapidly becoming quite a mouthful as trends drives for api’s and zero trust patterns. In many cases, the way forward for organizations to achieve an effective access control, they aim to implement a dynamic access control allowing them to implement e.g., external […]