Types of Access Control
Types of Access Control
Key Characteristics:
The owner (user or process) has full control over their resources and can determine
access permissions for other users.
Permissions are often assigned at the file or resource level.
It's the most flexible model, but also the least secure since the owner can
accidentally give access to malicious users.
Examples:
In operating systems like Windows, the owner of a file can set permissions for
other users to read, write, or execute the file.
A shared folder on a network where the owner grants or revokes access rights.
Pros:
Key Characteristics:
Access permissions are determined by the system, not the owner, and users cannot
change these permissions.
Resources and users are assigned security labels (such as "classified," "secret,"
"top-secret").
Access is granted based on clearance levels (only users with the appropriate
clearance can access higher-classified resources).
Examples:
Military and government systems where users are classified based on security
levels, and access to sensitive information is highly regulated.
Systems that require data separation based on different security levels (e.g., top
secret, secret, confidential).
Pros:
Provides a high level of security due to strict control over access permissions.
Centralized control over access permissions ensures that users cannot accidentally
or intentionally share sensitive information.
Cons:
Key Characteristics:
Key Characteristics:
Attributes can include user characteristics (e.g., job title, department), resource
characteristics (e.g., file type, sensitivity), and environmental conditions (e.g.,
time of day, location).
A central policy engine evaluates whether access should be granted based on the
attributes.
More dynamic and granular than RBAC because policies can be more complex and
consider a wide range of conditions.
Examples:
A cloud storage system where access to a sensitive file is only granted if the user
is in a specific location (e.g., the office), has the role of manager, and is
working during office hours.
A hospital system where doctors can access patient data only if they are physically
in the hospital and treating that particular patient.
Pros:
Key Characteristics:
The access decision is based on specific rules, independent of the user’s identity
or role.
Rules can be based on multiple conditions like time, network, or system states.
Often used in combination with other access control models like RBAC.
Examples:
An organization may have a rule that access to the corporate network is only
granted during business hours (9 AM to 5 PM) or from specific IP addresses.
A firewall rule that denies access to certain websites but allows access to others
based on predefined conditions.
Pros:
Highly customizable and flexible, as administrators can set specific rules for
different scenarios.
Can be used to fine-tune access beyond role or attribute models.
Cons:
Can become complex and difficult to manage as the number of rules increases.
Rules need constant updates to remain effective, which can be administratively
demanding.
6. Identity-Based Access Control (IBAC)
Definition: Identity-Based Access Control grants access based on the unique
identity of the user. Access rights are tied directly to the individual, not to
roles or groups they may belong to.
Key Characteristics:
A CEO might have specific access to certain corporate resources that no other role
or user can access, regardless of their job title.
A system that grants access to a specific individual based on their unique
credentials (e.g., biometric data).
Pros:
Access control decisions are based on the current state or context of the request.
Often used in environments where security needs to be adaptive and responsive to
changing conditions.
Examples:
A banking app may allow a user to access their account from their home network but
deny access if the request comes from a foreign country.
A system might allow access to sensitive data only during work hours but deny it
outside of those hours.
Pros:
Can be complex to implement and manage due to the many potential variables involved
in access decisions.
Requires sophisticated monitoring and analysis systems.