When inviting users or creating user groups, the following best practices ensure that only the required users have access to the workspace and have been assigned the required roles and persmissions.
| Best practices | Description |
| Define clear roles and responsibilities | Create roles based on the tasks which users would perform ensuring that users only have access to the resources necessary for their role. |
| Use Role-Based Access Control (RBAC) | Assign the respective roles to users with predefined permissions rather than assigning permissions directly to individual users. This simplifies management and ensures consistency. |
| Create Logical User Groups | Group users based on their roles and responsibilities. This makes it easier to manage permissions and apply policies. |
| Implement Strong Authentication Methods | Require strong, complex passwords and enforce regular password changes. |
| Conduct Regular Audits and Reviews | Regularly audit user access, roles, and security policies to ensure compliance and identify potential security gaps. |