Access controls are mechanisms that manage how resources are accessed and by whom. Here are some common types of access controls:

  • Role-Based Access Control (RBAC)

Permissions are assigned to specific roles rather than to individuals. Users are then assigned to these roles.

E.g. In a company, there might be roles such as “Manager” and “Employee”. The “Manager” role might have access to confidential reports, while the “Employee” does not.

  • Attribute-Based Access Control (ABAC)

Access is granted based on attributes (characteristics) of users, resources, and the environment.

E.g. A system may grant access to a file only if the user’s department is “HR” and file’s sensitivity level is “low”.

  • Mandatory Access Control (MAC)

Access us determined by a central authority based on security policies. Users cannot change these controls.

E.g. In government or military settings, access to documents is often based on clearance level (e.g. “Top Secret”)

  • Discretionary Access Control (DAC)

Access is granted by the owner of the resource. The owner can set permissions as they see fit.

E.g. A user creates a document and grants read and write access to specific colleagues.

  • Rule-Based Access Control

Access is based on a set of rules defined by the system administrator. These rules specify conditions under which access is granted.

E.g. Access to the office network is only granted during working hours (9 AM to 5 PM)


Systems can often use multiple access control mechanism to enhance security.

For example Windows uses DAC for folder permissions, RBAC is implemented in Active directory for managing user roles and permissions, and MAC in the feature MIC (Mandatory Integrity Control) is used to enforce data and process integrity by assigning integrity levels (IL) to processes, files, and other objects.

Previous articleSystem Failure Behaviours Explained
Next articleCyber Kill Chain
Joao Silva
I’m Joao Silva, an Incident Response Analyst who loves everything about cybersecurity. I enjoy tackling practical challenges on platforms like TryHackMe and HackTheBox, and I’m always learning more through industry certifications. My main skills are spotting security risks, analyzing threats, and doing digital forensics. I keep up with the latest technologies and cyber threats to ensure strong security measures. In my spare time, I work on projects to improve server security and automate monitoring. I also like to share my knowledge by publishing content on my website to help others learn. I’m dedicated to protecting data and maintaining system integrity in our constantly changing digital world.

LEAVE A REPLY

Please enter your comment!
Please enter your name here