You can customize your own access control model by combining the available models. For example, you can get RBAC roles and ABAC attributes together inside one model and share one set of policy rules.
The vulnerabilities, albeit classified as low severity by Microsoft, are listed below - Misconfigured Kubernetes RBAC in Airflow cluster Misconfigured secret handling of Azure's internal Geneva ...
CipherKeep: A secure system for managing sensitive data with features like encryption, RBAC, CRUD operations, version control, pagination, and detailed audit trails, built using Java and Spring Boot.