Defining roles on paper is one thing. Making them work in your actual organisation is another. The gap between a theoretical RBAC model and a practical one comes down to mapping — connecting real job functions to clearly defined access roles. Get this right and access management becomes predictable and auditable. Get it wrong and you end up with a role structure that nobody follows.
This lesson walks you through the practical process of identifying job functions, defining roles, and building a role-permission matrix that your organisation can actually use.
Starting with Job Functions, Not Systems
The most common mistake organisations make when implementing RBAC is starting with technology. They look at their systems and ask “what roles does this software support?” That is backwards. You should start with your people and ask “what do they actually need to do?”
A job function is a cluster of responsibilities that a person performs. In a small organisation, one person may cover multiple job functions. In a larger one, each function might have a dedicated team. Either way, the access required should be determined by the function, not the person.
- Accounts Payable — processes invoices, makes payments, reconciles supplier accounts
- Client Relationship Management — accesses client records, updates contact information, logs interactions
- People Management (HR) — manages employee records, handles recruitment, processes leave and payroll
- IT Operations — administers systems, manages user accounts, monitors infrastructure
- Executive Oversight — reviews reports, approves budgets, accesses board materials
Diagram
From Job Functions to Access Roles
Flowchart showing business job functions on the left feeding into defined access roles in the centre, which then map to specific system permissions on the right. Demonstrates the logical flow from business need to technical implementation.
Building a Role-Permission Matrix
A role-permission matrix is the core artefact of any RBAC implementation. It is a simple table that shows which roles have access to which systems, and at what level. This does not need to be complex — a well-structured spreadsheet is sufficient for most organisations.
The structure is straightforward:
- Rows represent roles (e.g., Finance Analyst, HR Manager, Standard User)
- Columns represent systems or data categories (e.g., Accounting Software, CRM, HR System, Email)
- Cells contain the access level: No Access, Read Only, Read/Write, or Admin
Building this matrix forces conversations that many organisations have never had. When you ask a department head “does your team actually need write access to the CRM?” the answer is often “I’m not sure — they’ve always had it.” That uncertainty is exactly the problem RBAC solves.
Diagram
Sample Role-Permission Matrix
A completed grid showing five roles across the top and six business systems down the side. Cells are colour-coded: green for appropriate access, amber for elevated access requiring justification, red for no access. Demonstrates how the matrix makes access decisions visible and auditable.
Handling Hybrid Roles and Exceptions
In practice, not every employee fits neatly into a single role. A finance manager who also oversees IT procurement may need permissions from two different roles. This is normal and RBAC accommodates it through composite roles — assigning a user multiple roles where each grants a specific set of permissions.
The key discipline is documentation. Every exception, every composite role, and every temporary elevation should be recorded with:
- Who — the specific user
- What — the additional permissions granted
- Why — the business justification
- When — the date granted and the review or expiry date
- Who approved it — the authorising manager or business owner
Without this discipline, exceptions become the norm and your RBAC model collapses back into ad-hoc access management within months.
Engaging Business Owners
RBAC cannot be defined by IT alone. IT can implement the technical controls, but business owners must define what access each role requires. The head of finance should decide what finance roles need. The head of HR should decide what HR roles need. IT should facilitate, not dictate.
This requires a structured conversation. For each department, ask:
- What systems does your team use daily?
- What level of access do they need in each system (read, write, admin)?
- Are there any tasks that require elevated or temporary access?
- Who should approve access requests for your team?
- How often should access be reviewed?
Diagram
RBAC Governance: Who Decides What
Responsibility diagram showing Business Owners (define access needs), IT (implement technical controls), and Security/Compliance (validate and audit). Arrows show approval flows and feedback loops between each group.
Why This Matters
A role-permission matrix is the single most requested document in a cybersecurity audit. Without it, you cannot demonstrate that access is appropriate, justified, or reviewed. Regulators expect that you can explain why any given person has access to sensitive data — and “because they asked for it” is not an acceptable answer.
Practically, a well-defined role structure also reduces onboarding time dramatically. When a new hire joins the marketing team, IT does not need to ask 15 questions about what access they need — they assign the Marketing role and move on.
What to Do Now
- List all job functions in your organisation — not job titles, but functional clusters of responsibilities
- Create a draft role-permission matrix using a spreadsheet with roles as rows and systems as columns
- Schedule 30-minute meetings with each department head to validate what access their teams actually need
- Identify any users who currently have access that does not match their job function
- Document any exceptions or hybrid roles with a clear business justification
Evidence to Collect
- A completed role-permission matrix showing roles, systems, and access levels
- Sign-off from department heads confirming the access requirements for their teams
- A list of exceptions and hybrid roles with documented justifications
- Evidence of an approval process for access requests (email trails, ticketing system entries)
Common Mistakes
- Letting IT define business roles. IT should implement roles, not decide what access a finance analyst needs. That is a business decision.
- Creating roles that are too granular. If every person has a unique role, you don’t have RBAC. Aim for roles that cover 80% of needs, with documented exceptions for the rest.
- Not reviewing the matrix. Business needs change. A role-permission matrix from two years ago may no longer reflect reality. Review at least annually.
- Forgetting contractors and third parties. External parties who access your systems need defined roles too — often with more restrictions than permanent staff.
Knowledge Check
Question 1 of 3
When building an RBAC model, what should you start with?
- The software systems your organisation uses
- The job functions and responsibilities people actually perform
- The most senior person in each department
- The IT department’s preferred configuration
Reveal Answer
B. Always start with job functions. Access should be determined by what people need to do, not by what systems happen to support. Starting with technology leads to roles that reflect software limitations rather than business needs.
Question 2 of 3
What should be documented for every RBAC exception or hybrid role?
- Only the user’s name and the system they need access to
- Who, what additional permissions, why (business justification), when (granted and review date), and who approved it
- A technical log of all login attempts
- The user’s employment contract
Reveal Answer
B. Every exception needs full documentation: the specific user, what additional permissions were granted, the business justification, the date and review/expiry date, and who authorised it. Without this discipline, exceptions erode the RBAC model.
Question 3 of 3
Who should define what access a finance team role requires?
- The IT department, because they manage the systems
- The head of finance or finance business owner, because it is a business decision
- The CEO, because they have final authority over everything
- The external auditor, because they review access controls
Reveal Answer
B. Business owners define access requirements for their teams. The head of finance knows what the finance team needs to do. IT implements the technical controls, but the access decision is a business responsibility.
Summary Notes — Mapping Roles to Job Functions
Key Takeaways
- Start with job functions, not systems — access should be driven by what people do, not by technology.
- A role-permission matrix (roles as rows, systems as columns, access levels in cells) is the core RBAC artefact.
- Business owners must define access requirements for their teams — IT implements, it does not decide.
- Exceptions and hybrid roles are normal but must be documented with full justification.
- Contractors and third parties need defined roles too, often with tighter restrictions.
Action Items
- Create a draft role-permission matrix in a spreadsheet.
- Meet each department head to validate access requirements.
- Document all exceptions with who, what, why, when, and who approved.
- Identify users with access that does not match their current job function.
Compliance Relevance
A role-permission matrix is expected evidence for ISO 27001 A.9.1.1 (Access Control Policy), Cyber Essentials (User Access Control), and NIST CSF PR.AC-4 (Access permissions are managed). Auditors will ask to see this document and evidence that it is reviewed regularly.