Skip to content

Access Control

Managing and restricting access to systems and data

Access Control encompasses the security techniques and policies used to regulate who or what can view or use resources in a computing environment.

Key Concepts

  • Authentication - Verifying the identity of users, systems, or entities
  • Authorization - Determining what authenticated entities are permitted to do
  • Accounting - Tracking and logging access and activities
  • Least Privilege - Granting minimum necessary access rights
  • Separation of Duties - Dividing critical functions among different individuals

Access Control Models

  • Discretionary Access Control (DAC) - Owner-controlled permissions
  • Mandatory Access Control (MAC) - System-enforced security labels
  • Role-Based Access Control (RBAC) - Permissions based on job functions
  • Attribute-Based Access Control (ABAC) - Policy-based on multiple attributes

Implementation Areas

  • Identity and Access Management (IAM)
  • Single Sign-On (SSO) and Federation
  • Multi-Factor Authentication (MFA)
  • Privileged Access Management (PAM)
  • Directory Services (Active Directory, LDAP)