Access control
Access control in information security is a fundamental concept aimed at protecting data and resources from unauthorized access. It involves the use of policies, procedures, and technologies to regulate who can view or use information in a computing environment.
Elements of Access Control
- Identification:
- The process of recognizing an individual or entity. Typically involves a username or an ID number.
- Authentication:
- Verifying the identity of the individual or entity. Common methods include passwords, biometrics, and security tokens.
- Authorization:
- Determining what resources or data an authenticated user is allowed to access. This often involves permissions and roles.
- Accountability:
- Ensuring that actions can be traced back to a specific user. This involves logging and monitoring activities.
Types of Access Control Models
- Discretionary Access Control (DAC):
- Owners of the data have control over who has access. They can set permissions based on their discretion.
- Mandatory Access Control (MAC):
- Access decisions are made by a central authority based on security policies. Users cannot change access rights.
- Role-Based Access Control (RBAC):
- Access rights are assigned based on roles within an organization. Users inherit permissions according to their role.
- Attribute-Based Access Control (ABAC):
- Access decisions are based on attributes (e.g., user characteristics, resource types, environment conditions) rather than fixed roles.