Home / ISO 27001 Glossary of Terms / Role-based access control (RBAC)

Role-based access control (RBAC)

11/09/2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

Role-based access control (RBAC) is a method of restricting system access to authorised users based on their job function or “role” within an organisation. Instead of assigning permissions to individual users, you assign them to specific roles, such as “Administrator,” “Accountant,” or “HR Manager.” Users are then granted the permissions associated with the roles they are assigned.

Why it’s a best practice

  • Efficiency: It simplifies the management of access rights, especially in large organisations. It’s much easier to manage roles than to manage permissions for every individual user.
  • Consistency: It ensures that all users in the same role have the exact same level of access, reducing the chance of errors or inconsistencies.
  • Least Privilege: RBAC naturally supports the principle of least privilege, ensuring users only have the permissions necessary to perform their job.

ISO 27001 Context

While RBAC is not explicitly defined in the ISO 27001 standard, it is a widely adopted and recommended implementation of the access control requirements found in ISO 27001 Annex A 5.15 Access Control. It’s a key technical control that helps organisations protect the confidentiality, integrity, and availability of information.

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.