From CISO Marketplace — the hub for security professionals Visit

Access Control

Identity & Access

Definition

Restricting system/resources access to authorized users only.

Technical Details

Access Control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in cybersecurity that ensures only authorized users are granted access to sensitive data, systems, or applications. Access control mechanisms can be categorized into several types: Discretionary Access Control (DAC), where the owner of the resource decides who can access it; Mandatory Access Control (MAC), which uses a centralized authority to enforce access policies; Role-Based Access Control (RBAC), where users are assigned roles that determine their access levels; and Attribute-Based Access Control (ABAC), which evaluates attributes of users and resources to grant access. These mechanisms involve authentication (verifying identity) and authorization (granting permissions) processes.

Practical Usage

In real-world applications, access control is implemented through various technologies and policies. Organizations typically use access control lists (ACLs) to define user permissions for specific resources. Multi-factor authentication (MFA) is often employed to enhance security by requiring users to provide two or more verification factors to gain access. Additionally, organizations may implement access control policies that define user roles and responsibilities, ensuring that employees only have access to the information necessary for their job functions. Access control is critical in sectors such as finance, healthcare, and government, where sensitive data must be protected from unauthorized access.

Examples

Related Terms

Authentication Authorization Identity Management Encryption Network Security
← Back to Glossary