Show Menu
Cheatography

Access Control Models Cheat Sheet by

GSEC CHEAT SHEET REGARDING ACCESS CONTROL MODELS

INTROD­UCTION

Access control is an essential aspect of inform­ation security that regulates access to resources based on predefined policies. Access control models determine the permis­sions granted to users or processes and the level of access they have to different resources. Several access control models have been developed to address different security requir­ements, such as Role-Based Access Control (RBAC), Attrib­ute­-Based Access Control (ABAC), Mandatory Access Control (MAC), Discre­tionary Access Control (DAC), Contex­t-Based Access Control (CBAC), and Risk-A­daptive Access Control (RAC).

ACCESS CONTROL MODELS

RBAC
RBAC is an access control model that associates permis­sions with roles rather than individual users. This model provides a scalable and flexible approach to access control, enabling the management of large and complex systems. RBAC assigns users to roles based on their job functions and respon­sib­ilities and allows admini­str­ators to manage permis­sions at the role level. Users can perform their tasks and access resources based on the permis­sions associated with their roles. This model is widely used in organi­zat­ions, such as health­care, finance, and govern­ment, to control access to sensitive data and resources.
ABAC
ABAC is an access control model that uses attributes to determine access to resources. This model enables a fine-g­rained and contex­t-aware approach to access control, where access decisions are based on user attrib­utes, resource attrib­utes, enviro­nmental attrib­utes, and policy attrib­utes. ABAC policies can be expressed in a formal language, such as XACML, and can be evaluated dynami­cally at runtime. This model is suitable for complex and dynamic enviro­nments, such as cloud computing and IoT, where access decisions are based on various factors, such as location, time, and device.
MAC
MAC is an access control model that enforces a hierar­chical and rigid access control policy. In MAC, the access rights to resources are determined by the system admini­strator or security policy, and users have limited control over their permis­sions. This model is commonly used in government and military enviro­nments to protect classified inform­ation and ensure data confid­ent­iality. MAC provides a high level of security but can be challe­nging to manage and admini­ster.
DAC
DAC is an access control model that grants users full control over their resources, enabling them to set permis­sions and share resources with other users. This model is widely used in personal computing and small-­scale systems, where users need flexib­ility and control over their resources. DAC provides a simple and intuitive approach to access control but can be challe­nging to scale and manage in large and complex systems.
CBAC
CBAC is an access control model that uses contextual inform­ation to determine access to resources. This model considers various factors, such as user identity, device location, time of day, and network topology, to make access decisions. CBAC provides a dynamic and adaptable approach to access control, enabling organi­zations to respond quickly to changing security threats and enviro­nmental factors. CBAC is suitable for enviro­nments, such as healthcare and finance, where access decisions are based on multiple factors.
RAC
RAC is an access control model that uses risk assess­ments to determine access to resources. This model evaluates various factors, such as user behavior, resource sensit­ivity, and enviro­nmental condit­ions, to calculate the level of risk associated with a particular access request. RAC policies can be dynami­cally adjusted based on the level of risk and can enable organi­zations to balance security and usability. RAC is suitable for enviro­nments, such as e-commerce and online banking, where access decisions are based on the level of risk associated with the transa­ction.
   
 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets

          GSEC CIS CONTROLS Cheat Sheet
          GSEC OVERVIEW Cheat Sheet

          More Cheat Sheets by xoulea

          Computer Networks Cheat Sheet
          Nmap Cheat Sheet