From CISO Marketplace — the hub for security professionals Visit

Access Control List (ACL)

Identity & Access

Definition

Network security rules governing resource access permissions to protect sensitive data.

Technical Details

An Access Control List (ACL) is a data structure that defines permissions attached to an object within a system, specifying which users or system processes are granted or denied access to objects such as files, directories, or network resources. ACLs can be implemented at various levels within a system architecture, including operating systems, firewalls, and databases. They typically consist of entries that contain the identity of a user or group and the associated permissions, which can include read, write, execute, and delete rights. ACLs can be discretionary (controlled by the owner of the resource) or mandatory (enforced by the system), and they play a crucial role in enforcing security policies and compliance regulations.

Practical Usage

ACLs are widely used in various applications to ensure that only authorized users can access sensitive data and resources. In a corporate environment, ACLs can be implemented on file servers to restrict access to confidential documents, allowing only certain employees to view or edit them. In network security, ACLs are used in routers and firewalls to control incoming and outgoing traffic by specifying which IP addresses or protocols are permitted or denied access to the network. Additionally, databases utilize ACLs to manage user access to specific tables or records, ensuring that sensitive information remains protected from unauthorized access.

Examples

Related Terms

Role-Based Access Control (RBAC) Discretionary Access Control (DAC) Mandatory Access Control (MAC) Network Access Control (NAC) Identity and Access Management (IAM)
← Back to Glossary