csi 425 dis 5
csi 425 dis 5
2. Access controls are a critical element in the security of systems. They are the control that allows an
individual to access data or specific systems
2. Assist Insider threat detection by seeing who desires access to specific data
3. Mitigate harm from corrupted accounts- by not allowing them to have too much access
4. Ease access control efforts to an easy-to-understand methodology with the ability to look up who
manages the architecture
1. MAC- Mandatory access control(Everyone is cleared to certain level I.E. military government)(Brown,
2024)
2. DAC- Discretionary access control(Every object and every item has access list)
3. RBAC- Role-based access control(Roles are assigned to each person that allows them access to specific
data in an architecture. User may have multiple roles)(Wright & Lutkevich, 2024)
1. The access control methods must be maintained to ensure compliance with security measures
2. The process to request additional access must be straightforward and easy to order or users will
circumvent the process (Brown, 2024)
3. There must be occasional audits of roles and resources assigned to ensure no one account has too
much access to sensitive data
4. threat actors may compromise specific credentials and this must be included in the calculus of who
has what roles
5. turning off the security measures may allow compromised accounts to access additional information
Conclusion
1. Access controls are an indispensable component of any security framework, serving the interests of
the users and company to ensure privacy is maintained primarily for Work for home users.
2. The risk will be mitigated by regulating access control and ensuring compliance with the models.
3. adequate access controls foster a culture of security within an organization, where every member
understands their role in safeguarding data and systems against unauthorized access.
References
Brown, S. (2024, May 2). 3 types of access control: IT security models explained. StrongDM.
https://www.strongdm.com/blog/types-of-access-control
Microsoft. (2025). What is access control?: Microsoft security. What Is Access Control? | Microsoft
Security. https://www.microsoft.com/en-us/security/business/security-101/what-is-access-control
Wright, G., & Lutkevich, B. (2024, September 27). What is access control?: TechTarget. Search Security.
https://www.techtarget.com/searchsecurity/definition/access-control