IAM Role Diet

A Scalable Approach to Detecting RBAC Data Inefficiencies

Conference Paper (2025)
Author(s)

Roberto Moratore (ING Bank)

Eduardo Barbaro (TU Delft - Organisation & Governance, ING Bank)

Yury Zhauniarovich (TU Delft - Organisation & Governance)

Research Group
Organisation & Governance
DOI related publication
https://doi.org/10.1109/DSN-S65789.2025.00052
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Organisation & Governance
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository as part of the Taverne amendment. More information about this copyright law amendment can be found at https://www.openaccess.nl. Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.@en
Pages (from-to)
126-132
Publisher
IEEE
ISBN (print)
979-8-3315-1203-3
ISBN (electronic)
9798331512033
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

More than three decades after its introduction, Role-Based Access Control (RBAC) continues to be one of the most widely used access control models in organizations. This popularity stems from its simplicity, the reduced risk of errors, and its clear alignment with business processes. However, the primarily manual nature of data management in RBAC systems, coupled with a lack of oversight, can lead to various inefficiencies over time. These may include roles that are not assigned to any users or roles that have identical sets of permissions. Such issues can slow down systems that rely on these data and, more critically, complicate auditing processes, increasing the risk of security gaps and compliance violations.In this paper, we present a taxonomy of inefficiencies that can arise in RBAC data over time and propose a framework for detecting these inefficiencies. We specifically focus on the most resource-intensive inefficiencies, namely roles that share the same or similar users or permissions. To address these issues, we propose three detection methods, including a custom algorithm we developed. We evaluate these methods using synthetic datasets, demonstrating that our algorithm significantly outperforms baseline approaches. Its efficiency allows us to identify these inefficiencies even on a standard laptop used by large organizations. Furthermore, we applied our framework to real RBAC data from a large organization with over 60,000 employees and uncovered a substantial number of inefficiencies, highlighting its practical value in real-world scenarios.

Files

IAM_Role_Diet_A_Scalable_Appro... (pdf)
(pdf | 0.486 Mb)
- Embargo expired in 09-01-2026
Taverne