Done

icon picker
Role Based Access

At Boundless, I've taken significant steps to manage access levels in HubSpot, ensuring our operations remain secure and efficient. By assigning user permissions based on the principle of least privilege, I've made sure that team members access only the necessary data and functionalities for their roles. This not only protects our data but also simplifies the management of user permissions, reducing the potential for errors.
I've been careful with granting super admin access, restricting it to a select group within our Business Leadership Team (BLT). This minimises the risk of data breaches and unauthorised changes, safeguarding our company's operations. Super admin privileges are powerful, and limiting their distribution helps maintain control and enhances our security monitoring capabilities.
Additionally, I've deactivated accounts for 10 users who are no longer active at Boundless, significantly reducing our vulnerability to attacks. This action prevents unauthorised access from former employees and ensures that our systems remain secure.
I've also implemented more granular permission levels based on job roles to enhance both security and operational efficiency. This approach tailors access according to the specific needs and responsibilities of each role, ensuring employees have the necessary tools without unnecessary complications.
verified-account
Overall, these actions have strengthened our data security framework, reduced risks of unauthorised access, and ensured that our operations are both efficient and compliant with best practices in data management. This proactive management of our HubSpot environment demonstrates our commitment to maintaining a secure and efficient operational framework.

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.