Authorization Strategy
Authorization (or establishment or entitlement) defines a user's (or process') rights and permissions to a resource. After a user (or process) is authenticated, authorization determines what that user can do to the resource.
Here are some authorization strategies to improve security:
By default, grant users no rights and permissions
Grant users least privileged rights and permissions on "need to know" basis
Push authorization processes from upper/applications layers to lower/OS layers as much as possible
Prepare or plan Role-Based authorization
Move from manual authorization management processes to automated authorization management processes with next generation IAM role/group management products
Please be aware of that Role-Base authorization will be a subset of Claim-Based authorization in long term.