Access control: Types of access control systems (2024)

When we refer to access control systems, we’re talking about providing access to restricted areas of the enterprise. But familiarity and correctly utilizing access control systems to protect proprietary information are two completely different levels of understanding. For example, who gets access to what? What are the rules? How is access tracked?

The user must first be identified and authenticated before being granted access to private information—which means the basics of an access control system include criteria and records for every time someone “enters” the system.

Depending on the type of organization, the enterprise should consider a couple of broad ideas—what level of ownership it will have over the system, and how to decide which employees get access to what. There are many models, each with different benefits.

The most common types of access control systems

Mandatory access control (MAC)

The mandatory access control system provides the most restrictive protections, where the power to permit access falls entirely on system administrators. That means users cannot change permissions that deny or allow them entry into different areas, creating formidable security around sensitive information.

It even restricts the resource owner’s ability to grant access to anything listed in the system. Once an employee enters the system, they're tagged with a unique connection of variable “tags”—like a digital security profile—that speaks to what level of access they have. So depending on what tags a user has, they will have limited access to resources based on the sensitivity of the information contained in it. This system is so shrewd, in fact, that it’s commonly used by government entities because of its commitment to confidentiality.

Discretionary access control (DAC)

A discretionary access control system, on the other hand, puts a little more control back into leadership's hands. They determine who can access which resources, even if the system administrator created a hierarchy of files with certain permissions. All it takes is the right credentials to gain access.

The only disadvantage, of course, is giving the end-user control of security levels requires oversight. And since the system requires a more active role in managing permissions, it’s easy to let actions fall through the cracks. Where the MAC approach is rigid and low-effort, a DAC system is flexible and high-effort.

Role-based access control (RBAC)

Role-based access control attributes permissions to a user based on their business responsibilities. As the most common access control system, it determines access based on the user's role in the company—ensuring lower-level employees aren’t gaining access to high-level information.

Access rights in this method are designed around a collection of variables that map back to the business—such as resources, needs, environment, job, location, and more. Many executives like this approach because it’s simple to group employees based on the kind of resources to which they need access. For example, someone in human resources does not need access to private marketing materials, and marketing employees don’t need access to employee salaries. RBAC provides a flexible model that increases visibility while maintaining protection against breaches and data leaks.

More detailed, hands-on access control

While there are some established practices in access control, technology has given us the opportunity for more customized approaches. Depending on how “hands-on” the enterprise wants to be, there are many ways to think about it.

Rule-based access control

As you might have guessed, this system grants permissions based on structured rules and policies. Largely context-based, when a user attempts to access a resource, the operating system checks the rules decided on in the “access control list” for that specific resource. Creating the rules, policies, and context adds some effort to the rollout. Additionally, this system will often be blended with the role-based approach we discussed earlier.

Attribute-based access control

Drilling down a level deeper, this type of system provides different dynamic and risk-intelligent control based on attributes given to a specific user. Think of these attributes as components of a user profile; together they define the user's access. Once policies are set, they can use these attributes to read whether or not a user should have control. These attributes can also be obtained and imported from a separate database—like Salesforce, for example.

"Smarter,” more intuitive control systems

Some control systems transcend technology all together. These are the systems that operate on a deeper, more intuitive level.

Identity-based access control

The most simple, yet the most complex—identity-based control dictates whether a user is permitted access to a resource based on their individual visual or biometric identity. The user will then be denied or permitted access based on whether or not their identity can be matched with a name appearing on the access control list. One of the main benefits of this approach is providing more granular access to individuals in the system, as opposed to grouping employees manually. This is a very detailed, technology-driven approach that gives an abundance of control to the business owner.

History-based access control

Another “smart” solution is a history-based access control system. Based on past security actions, the system determines whether or not the user gains access to the resource they’re requesting. The system will then scrape that user’s history of activities—time between requests, content requested, which doors have been recently opened, etc. For example, if a user has a long history of working exclusively with secured accounting materials, a request to access next year’s marketing roadmap might be flagged in the system.

The future: AI-driven Identity Management

As access control moves into the future, the responsibility of managing the systems will continue to shift away from people and towards technology. Artificial Intelligence (AI) not only allows us to evaluate access permissions for users in real-time, but it’s also able to forecast the entire lifecycle of an employee. These solutions not only protect us from the “now,” they’re able to identify risks and compliance issues before they become serious. The enterprise no longer has to tightly monitor the complicated web of policies and access control lists, because AI simplifies visibility at a high level.

Wrapping Up

While access control has evolved from protecting physical documents in real buildings to cloud-based systems, the idea of protecting the enterprise's resources is never going out of style. The smarter we get with technology, the more options we’re going to have. Understanding the variables that matter—things like organization size, resource needs, employee locations—will help inform your decision.

Want to learn more about how we use technology and AI to recommend the right access model for you? Read more here.

Take control of your cloud platform.

Learn more about Access Modeling.

Access control: Types of access control systems (2024)

FAQs

What are the types of access control systems? ›

What Are the Different Types of Access Controls?
  • Attribute-based access control (ABAC) ...
  • Discretionary access control (DAC) ...
  • Mandatory access control (MAC) ...
  • Role-based access control (RBAC) ...
  • Break-glass access control. ...
  • Rule-based access control.

What are the 3 common methods of access control? ›

The 3 types of access control are Role-Based Access Control (RBAC) systems, Attribute-Based Access Control (ABAC) and Discretionary Access Control (DAC). Each of the three access control types can be leveraged to ensure that your property and data is secure.

What are the four-four main access control models? ›

Access control and access control models

There are four types of access control methods: Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC).

What are the five access control models? ›

Types of access control
  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Role-Based Access Control (RBAC)
  • Rule-Based Access Control.
  • Attribute-Based Access Control (ABAC)
Feb 7, 2024

What are the three types of control systems? ›

Three basic types of control systems are available to executives: (1) output control, (2) behavioral control, and (3) clan control. Different organizations emphasize different types of control, but most organizations use a mix of all three types.

What are the 4 elements of access control? ›

Most physical access control systems consist of four basic elements:
  • Credentials.
  • Readers.
  • Controllers.
  • Software Application.

What is an example of an access control system? ›

Common physical access control examples include commercial door locks, turnstiles and security gate systems or any type of physical barrier. Identifying personal credentials: Most PACS require users to have a means of identifying themselves, proving that they're authorized to access the physical space.

What is the best type of access control? ›

The four types of access models are discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC), and rule-based access control (RuBac). RuBAC models are considered the best access control model because of their high flexibility for most types of properties.

What are the four Ds of access control? ›

Deter, Detect, Delay and Defend.

What are the three main elements of access control? ›

Access control is a vital part of information security and is defined as the process by which you grant or deny access to your data, property, and other objects. Three elements make up access control: identification, authentication, and authorization.

What are the three A's of access control? ›

What is Authentication, Authorization, and Accounting (AAA)? Authentication, authorization, and accounting (AAA) is a security framework that controls access to computer resources, enforces policies, and audits usage.

What are the 5 D's of access control? ›

The 5 Ds of perimeter security (Deter, Detect, Deny, Delay, Defend) work on the 'onion skin' principle, whereby multiple layers of security work together to prevent access to your site's assets, giving you the time and intelligence you need to respond effectively.

What is the most common access control list? ›

How many types of access control there are depends on you ask and who they're designed for. However, the four most common are attribute-based, role-based, discretionary, and mandatory, each having its own use cases.

What are the two main access control lists? ›

Standard vs extended ACLs: There are two main categories of ACLs: standard ACL and extended ACL. The standard ACL does not differentiate between IP traffic; instead, it allows or blocks traffic based on the source IP address.

What are the 4 key access control items within the system? ›

Key takeaways

The four types of access models are discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC), and rule-based access control (RuBac). RuBAC models are considered the best access control model because of their high flexibility for most types of properties.

Top Articles
Wondering how to contact Gmail Customer Service? Here's 4 ways to get help
Classic Car Insurance for Automotive Enthusiasts | Hagerty Agent
Skylar Vox Bra Size
Libiyi Sawsharpener
Quick Pickling 101
Unitedhealthcare Hwp
Bellinghamcraigslist
Rochester Ny Missed Connections
WK Kellogg Co (KLG) Dividends
True Statement About A Crown Dependency Crossword
Hardly Antonyms
Inside California's brutal underground market for puppies: Neglected dogs, deceived owners, big profits
Purple Crip Strain Leafly
454 Cu In Liters
Gopher Hockey Forum
Where Is George The Pet Collector
Why Should We Hire You? - Professional Answers for 2024
Sussur Bloom locations and uses in Baldur's Gate 3
Xsensual Portland
How many days until 12 December - Calendarr
Village
Two Babies One Fox Full Comic Pdf
Cpt 90677 Reimbursem*nt 2023
Cognitive Science Cornell
Sandals Travel Agent Login
Past Weather by Zip Code - Data Table
Hannah Jewell
Wisconsin Volleyball Team Leaked Uncovered
Average weekly earnings in Great Britain
Slv Fed Routing Number
Netherforged Lavaproof Boots
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
Pillowtalk Podcast Interview Turns Into 3Some
3302577704
ENDOCRINOLOGY-PSR in Lewes, DE for Beebe Healthcare
Empires And Puzzles Dark Chest
Mvnt Merchant Services
Stanley Steemer Johnson City Tn
Nsav Investorshub
Weather Underground Corvallis
Brandon Spikes Career Earnings
Sams Gas Price Sanford Fl
Craigslist Farm And Garden Reading Pa
LoL Lore: Die Story von Caitlyn, dem Sheriff von Piltover
Promo Code Blackout Bingo 2023
LumiSpa iO Activating Cleanser kaufen | 19% Rabatt | NuSkin
John M. Oakey & Son Funeral Home And Crematory Obituaries
Dayton Overdrive
Food and Water Safety During Power Outages and Floods
Dumb Money Showtimes Near Regal Stonecrest At Piper Glen
Ok-Selection9999
Booked On The Bayou Houma 2023
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5483

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.