Different Access Control Models b190001-5
Different Access Control Models b190001-5
Contents
● Role-based access control (RBAC)
● Rule-based access control (RuBAC)
● Best Access Control Model
● Summary
What is access control?
Access control is the act of maintaining security by strategically controlling who can access your
property and when. Access control is the process of:
.
In information security, one would look at this as:
● Granting an individual permission to get onto a network via a username and password.
● Allowing them access to files, computers, or other hardware or software they need.
● Ensuring they have the right level of permission to do their job.
The 4 main access control models are:
● The discretionary access control model is one of least restrictive access control
models. It allows for multiple administrators to control access to a property.
● While this limits the number of people who can edit user permissions, this model can
also put an organization at risk because the decision maker may not be aware of the
security implications of their decisions
● The decisions on user permissions are taken at the discretion of one person, who may
or may not have security expertise.
● This model is straightforward to use and makes it easy to assign access to users.
2. Mandatory access control (MAC)
● The role-based model is also known as non-discretionary access control. This model
assigns every user a specific role that has unique access permissions.
● System administrators have the ability to assign user roles and manage access for
each role.
● Role-based access control builds security around an employee’s role and this can help
develop strong policies in businesses with large numbers of employees.
● instead of assigning Alice permissions as a security manager, the position of security
manager already has permissions assigned to it.
4. Rule-based access control (RuBAC)
● Rule- and role-based access control are two of the most important models for
determining who has access to specific areas or resources within a business.
● By implementing the most appropriate model, a security administrator can manage
access at a high level or apply granular rules to provide specific protection for
high-security areas.
● While both models provide effective security and strong benefits, they require
different levels of effort to develop, implement, and manage access security policies.
● rule-based and role-based models complement each other and can be deployed as a
hybrid model for even stronger access control security.
Summary
● Access control systems allow verified users to access a property while preventing
unauthorized people from entering.
● Access control models differ based on the user permissions they grant.
● RuBAC models are considered the best access control model because of their high
flexibility for most types of properties.
References
https://delinea.com/blog/access-control-models-methods
https://www.openpath.com/blog-post/access-control-models
https://butterflymx.com/blog/access-control-models/
Thank You !!!