Section 17.164 Access Control Models Flashcards

Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.

1
Q

Different Types of Access Control Models

Mandatory Access Control (MAC)

A

Uses security labels to authorise resource access

● Requires assigning security labels to both users and resources

● Access is granted only if the user’s label is equal to or higher than the resource’s label

Generally reserved for high security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Different Types of Access Control Models

Discretionary Access Control (DAC)

A

Resource owners specify which users can access their resources

● Access control based on user identity, profile, or role

● Allows resource owners to grant access to specific users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Different Types of Access Control Models

Role-Based Access Control (RBAC)

A

Assigns users to roles and assigns permissions to roles

● Roles mimic the organization’s hierarchy

● Enforces minimum privileges

● Effective for managing permissions based on job roles and turnover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Different Types of Access Control Models

Rule-Based Access Control

A

Uses security rules or access control lists

● Policies can be changed quickly and frequently

● Applied across multiple users on a network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different Types of Access Control Models

Attribute-Based Access Control (ABAC)

A

Considers various attributes like…

User Attributes: User’s name, role, organization ID, or security clearance

Environment Attributes: Time of access, data location, and current organisations threat level

Resource Attributes: File creation date, resource owner, file name, and data sensitivity

● Access decisions are based on the combination of attributes

● Provides fine-grained control and dynamic access decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Control Extensions

Time-of-Day Restrictions

A

● Limits access based on specific time periods

● Often used to complement other access control models

● Helps prevent unauthorised access during non-working hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Control Extensions

Principle of Least Privilege

A

● Users are granted the minimum access required to perform their job
functions

● Reduces the risk of misuse or accidental damage

● Regularly review and adjust permissions to prevent authorisation creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly