Week 7 - Access Control
Access control is how organizations decide who can see or use certain information, tools, or areas. It’s a key part of keeping data and systems safe. There are several models used to manage access, and each works a little differently depending on what a company needs.
The first type is Discretionary Access Control (DAC). This model gives control to the person who owns the information or file. That person decides who else can access it. DAC is easy to use and flexible, but it can be risky if users make mistakes or don’t manage access carefully.
Mandatory Access Control (MAC) is much stricter. In this model, only a system administrator can decide who gets access. Users can’t make changes on their own. MAC is often used in high-security places like government offices because it keeps control tight and consistent.
Role-Based Access Control (RBAC) is common in businesses. People are given access based on their job role. For example, a manager might have access to more tools than a regular employee. RBAC is easy to manage, especially in larger companies, but it can get messy if too many roles are created.
Attribute-Based Access Control (ABAC) uses different details, or “attributes,” like someone’s job, department, or even the time of day, to decide if they can access something. It’s very flexible and specific but can also be hard to set up and manage.
Lastly, Lattice-Based Access Control (LBAC) works by ranking access in levels. A person can only access things that match their level or are below it. This model is good for places that deal with sensitive or classified information.
Each of these models has its pros and cons. The best one depends on the kind of work your organization does and how much control you need over who gets access to what. Choosing the right model helps keep systems safe while making sure the right people can get the information they need.
Devasia, A. (2024, March 28). 5 types of Access Control Models & Methods explained. Safe and Sound Security. https://getsafeandsound.com/blog/access-control-models/
Comments
Post a Comment