Online Learning Platform

Information SEcurity > Access Control in Security > Security Access Controls

Types of Security Access Controls

There are several technical approaches to managing access control. Global standards like ISO/IEC 27002 provide authoritative guidance for implementing models such as

 

Role-Based Access Control (RBAC): Role-Based Access Control (RBAC) is an access control method where users receive permissions based on their job roles within an organization. Instead of assigning permissions individually to every user, permissions are assigned to roles, and users are assigned to those roles.

For example, a financial analyst may have access to financial records but not to human resource (HR) data. RBAC is widely used because it is simple to manage and easy to understand. It also helps organizations maintain consistent access permissions.

Attribute-Based Access Control (ABAC): Attribute-Based Access Control (ABAC) is a flexible access control model that makes decisions based on different attributes and conditions. These attributes may include user information, resource type, device details, location, or time of access.

For example, a company may allow access only to employees working from the office during business hours. ABAC is very useful in complex environments where many factors must be considered before granting access.

Because of its flexibility, ABAC can provide more precise and dynamic security control than traditional models.

Discretionary Access Control (DAC): Discretionary Access Control (DAC) allows the owner of a file or resource to decide who can access it. Users can grant or remove permissions for other users.

For example, a document owner may choose to share a file with selected coworkers. DAC provides flexibility and personal control over resources.

However, DAC can create security risks because users may accidentally give access to unauthorized people.

Mandatory Access Control (MAC): Mandatory Access Control (MAC) is a highly secure access control model where access decisions are based on security classifications and user clearance levels.

In this model, users cannot change access permissions on their own. The system strictly controls access according to predefined security rules.

MAC is commonly used in military organizations, government agencies, and other environments that handle highly sensitive information. Although MAC provides strong security, it can be difficult and expensive to manage.

Policy-Based Access Control (PBAC): Policy-Based Access Control (PBAC) uses a set of security policies to determine whether access should be allowed or denied. These policies may include roles, attributes, rules, and environmental conditions.

PBAC allows organizations to create detailed and flexible access rules based on their specific security needs. For example, access may depend on the user’s department, device type, or network location.

PBAC is similar to ABAC but is generally easier to implement and requires fewer technical resources. It is useful for organizations that need fine-grained access control without overly complex management.

 

Prev
Types of Authentications
Next
Challenges of Access Control in Cybersecurity
Feedback
ABOUT

Statlearner


Statlearner STUDY

Statlearner