Skip to the content.

Access Control

Security Control

A control is a protective measure aiming to uphold the principles of Confidentiality, Integrity, and Availability (CIA Triad) for data.

Access control, a subset, dictates the availability of objects to subjects based on specific rules.

For instance, a firewall is a control implemented in systems or networks to prevent external threats from compromising the environment and restrict unauthorized access to information within.

Elements of Access Control

Access controls involve more than just limiting access; they also encompass facilitating appropriate access for authorized personnel and processes while blocking access for unauthorized functions or individuals.

Subjects

Subjects are the active initiators of service requests.

Objects

By definition, anything that a subject attempts to access is referred to as an object.

Rules

Access rules guide whether a subject can access an object based on their validated identity. For instance:

Controls Assessment

Risk reduction relies on the control’s efficacy, adapting to changing situations. In securing a repurposed office space for confidential file storage, consider the following:

Privileged Access Management

To ensure confidentiality, integrity, and availability of information, the Principle of Least Privilege is employed through Privileged Acces ,Management. Users receive access only to essential items, limiting exposure.

Physical Access Controls

What it is

Physical access controls are tangible security measures designed to prevent, monitor, or detect direct contact with systems or specific areas within a facility.

Examples of Physical Access Controls

Priority in Deployment

Physical Security

Securing Facilities

Surveillance System

Organized strategy or setup designed to observe and report activities in a given area.

Logging

This includes physical logs, such as sign-in sheets or electronic access system logs. It emphasizes the importance of logs in supporting business needs, compliance, and forensic investigations.

Alarm Systems

Alarm systems aim to promptly notify relevant authorities in case of unexpected events.

Visitor Management Policy

A visitor management policy is a vital component of physical access controls, as it helps organizations track and manage visitor access.

Considerations on Choosing an Access Control System

The following are some considerations:

Example:

Primary consideration when choosing physical access controls

Reference: ISC2 Study Guide, Chapter 3, Module 2.

Site Assessment

Physical Attacks

Attacking with Brute Force

Bypassing surveillance systems

Access badge cloning

Logical Access Controls

What it is

Physical access controls utilize tangible methods to limit entry to specific areas or assets, whereas logical access controls employ electronic methods to restrict access to systems, and occasionally tangible assets or areas.

These electronic tools play a crucial role in restricting logical access to an asset, independent of an individual’s physical access.

Discretionary Access Control (DAC)

Discretionary Access Control (DAC) is an access control policy governing subjects and objects in an information system.

DAC in the Workplace

Mandatory Access Control (MAC)

Mandatory Access Control (MAC) ensures a uniform policy across an information system, restricting specific actions to trusted security administrators.

Unlike Discretionary Access Control (DAC), MAC mandates access rights rather than relying on owner discretion.

MAC in the Workplace

Determines access uniformly based on policies, often associated with government agencies.

Bell and LaPadula access control modeel

The Bell and LaPadula access control model arranges subjects and objects into security levels and defines access specifications, whereby subjects can only access objects at certain levels based on their security level.

Attribute-Based Access Control (ABAC)

Attribute-Based Access Control (ABAC) manages access based on user, resource, and environmental attributes.

Role-Based Access Control (RBAC)

Assigns user permissions based on predefined roles, streamlining access management.

RBAC in the Workplace

Role-based access control tailors user privileges based on their organizational roles, ensuring appropriate access.

Role-Based Access Control (RBAC) defines user access based on roles, while Rule-Based Access Control defines access based on rules. Here’s a distinction between the two:

Rule-Based Access Control (RBAC)

Grants or restricts access based on a set of rules or conditions, rather than roles.

Other Concepts

Trust but Verify

The “Trust but verify” model is a method of threat protection that involves granting privileged accounts access to the network and other resources, while at the same time verifying their actions and activities.

Need to Know

Need to know is a principle that limits access to information to only those who require it to perform their job duties (see ISC2 Study Guide, Chapter 3, Module 1).

Example:

Account Review

Account review is a process used to verify that employees have the necessary privileges considering their roles within the organization

Re-provisioning

Account Revocation

Privilege creep

Privilege creep occurs when an individual accumulates access rights beyond what is necessary for their current job responsibilities, often as a result of changing roles within an organization.

Decentralized Access Control

Decentralized access control means that access permissions and management are scattered across different departments or systems within an organization.

Example:

Self-service Password Reset


Back to main page