Domain 5 - Identity And Access Management Flashcards
Low security cost because security is configured based on roles.
Role-based access control (RBAC)
Easier to implement than other access control models.
RBAC
Is not user friendly.
RBAC
More user friendly than other access control models.
Discretionary Access Control (DAC)
Allow the data owner to determine user access rights.
DAC
If a user needs access to a file, he only needs to contact the file owner.
DAC
Is not discretionary in nature.
RBAC
is discretionary in nature.
DAC
Is not used in a highly secure environment.
RBAC
Use in a highly secure environment.
Mandatory Access Control (MAC)
Every subject and object is assigned a security label.
MAC
Is easy to enforce minimum privilege for general users.
RBAC
Users are assigned into roles based on the structure of the organization, which is usually hierarchical.
RBAC
A popular access control model used in commercial applications, especially large network applications.
RBAC
Access Control models considered non-discretionary in nature.
RBAC, MAC, and context-based access control (CBAC)
This method type relies on security policies and security labels to determine an object’s access to resources.
Non-discretionary access control method
This type of access control allows the resource owner to determine the level of resource access given to a user.
Discretionary Access Control (DAC)
These type of method of access control is usually managed by a central administrator who determines that the subject’s access rights are based on security policy and the user’s roles and responsibilities related to his duties in the organization.
Non-discretionary access control method
Benefits of Role-based access control.
Easy to implement and manage; cost effective