Access Control Techniques and Technologies

Once an organization determines what type of access control model it is going to use, it needs to identify and refine its technologies and techniques to support that model. The following sections describe the different access controls and technologies available to support different access control models.

Rule-Based Access Control

Everyone will adhere to my rules.

Response: Who are you again?

Access Control Models

The main characteristics of the three different access control models are important to understand.

  • DAC Data owners decide who has access to resources, and ACLs are used to enforce the security policy.

  • MAC Operating systems enforce the system’s security policy through the use of security labels. ...

Get CISSP Certification All-in-One Exam Guide, Fourth Edition, 4th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.