Access control system

Beginner

A system that manages and restricts who or what can view, use, or access a resource in a computing environment. It is a fundamental security concept that minimizes risk to an organization by enforcing policies through authentication and authorization.

First Used

1960s

Definitions

2

Synonyms
Access managementAuthorization systemPermission control

Definitions

1

Fundamental Security Mechanism

At its core, an access control system is a fundamental security mechanism that enforces policies to control who can access a resource. It functions as a gatekeeper for digital and physical assets, such as files, databases, applications, servers, or even physical rooms.

The system operates on two primary functions:

  • Authentication: Verifying the identity of a user or process (the subject). This is the 'who are you?' step, often involving credentials like a password, a fingerprint, or a security key.

  • Authorization: Determining the access rights of an authenticated subject for a specific resource (the object). This is the 'what are you allowed to do?' step, granting permissions like read, write, delete, or execute.

A key principle guiding any effective access control system is the Principle of Least Privilege. This principle states that a user should only be granted the minimum levels of access—or permissions—needed to perform their job functions. This minimizes the potential damage from accidents or security breaches.

2

Access Control Models

Access control is not a one-size-fits-all solution. Different models have been developed to suit various security needs and organizational structures. These models provide the logical framework for the authorization system.

Discretionary Access Control (DAC)

In a DAC model, the owner of a resource has the discretion to grant or deny access to other users. It is the most flexible model and is commonly found in consumer operating systems like Windows, macOS, and Linux, where users can set permissions for their own files and folders.

Mandatory Access Control (MAC)

MAC is the most restrictive model. Access decisions are made by a central authority (the system administrator) and enforced by the operating system based on security labels. Both subjects (users) and objects (resources) are assigned a security level (e.g., Top Secret, Secret, Unclassified). Access is granted only if the user's security level is equal to or higher than the resource's level. This model is primarily used in environments requiring high security, such as military and government systems.

Role-Based Access Control (RBAC)

RBAC is the most widely used model in corporate environments. Instead of assigning permissions directly to individual users, permission control is managed through roles. Users are assigned to roles (e.g., Administrator, Marketing Manager, Sales Representative), and each role is granted a specific set of permissions. This greatly simplifies access management, especially in large organizations with high employee turnover.


Origin & History

Etymology

The term is a straightforward combination of 'access' (the ability to approach or use something), 'control' (the power to influence or direct), and 'system' (a set of interconnected components working together).

Historical Context

The concept of an **access control system** originated in the 1960s and 1970s with the development of multi-user mainframe operating systems like Multics. These early systems needed a way to separate and protect data belonging to different users, leading to the creation of the first Discretionary Access Control (DAC) models. During the 1980s, the focus shifted towards higher security, driven by government and military requirements. This era saw the formalization of Mandatory Access Control (MAC) models, such as the Bell-LaPadula model, which enforced strict, centrally managed security policies based on classification levels. The 1990s brought a significant shift with the introduction of Role-Based Access Control (RBAC). As businesses and networks grew more complex, managing individual user permissions became unscalable. RBAC simplified **access management** by grouping permissions into roles, making administration far more efficient and less error-prone. From the 2000s to the present, the rise of the internet, cloud computing, and distributed systems has led to even more sophisticated models. Attribute-Based Access Control (ABAC) emerged to provide more dynamic and context-aware decisions. More recently, the Zero Trust security model has gained prominence, which operates on the principle of "never trust, always verify," requiring strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.


Usage Examples

1

To comply with data protection regulations, the company deployed a new access control system to log and restrict access to sensitive customer information.

2

The network administrator configured the firewall as part of the overall access management strategy to prevent unauthorized external connections.

3

Our application's authorization system ensures that only users with the 'editor' role can modify documents, while others can only view them.

4

Effective permission control is crucial; we follow the principle of least privilege, granting employees access only to the resources absolutely necessary for their jobs.


Frequently Asked Questions

What are the three main types of access control models?

The three main types of access control models are:

  • Discretionary Access Control (DAC): The owner of the resource determines who has access and what privileges they have. It is flexible but can be difficult to manage securely in large organizations.

  • Mandatory Access Control (MAC): Access is determined by the system based on security labels (e.g., classifications like 'Confidential' or 'Public') assigned to users and resources. This is a highly restrictive and centrally managed model often used in government and military systems.

  • Role-Based Access Control (RBAC): Access is granted based on the user's defined role within an organization (e.g., 'Administrator', 'Manager', 'Guest'). This is the most common model in corporate environments because it simplifies permission control.

What is the difference between authentication and authorization in an access control system?

Authentication and authorization are two distinct but sequential steps in an access control system.

  • Authentication is the process of verifying a user's identity. It answers the question, "Who are you?" This is typically done using passwords, biometrics, or security tokens.

  • Authorization is the process of determining what an authenticated user is allowed to do. It answers the question, "What are you allowed to do?" After a user is successfully authenticated, the system checks their permissions to decide if they can access a specific file, database, or feature.


Categories

SecurityComputer Science

Tags

securityauthenticationauthorizationidentity managementcybersecurity