Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Access control is the backbone of every security architecture you'll encounter in cybersecurity business contexts. When you're being tested on this material, examiners aren't just checking whether you can define DAC or RBAC—they want to see that you understand why organizations choose one method over another, how these methods balance security with usability, and what happens when access controls fail or are poorly implemented. These concepts connect directly to risk management, compliance frameworks, and the principle of defense in depth.
The methods covered here demonstrate core security principles: least privilege, separation of duties, defense in depth, and the constant tension between security and convenience. Don't just memorize what each acronym stands for—know what business problem each method solves, which environments favor which approaches, and how they can be combined. That's what separates a passing answer from an excellent one.
These methods define who decides what access users receive. The fundamental question: should resource owners, central authorities, or organizational structure determine permissions?
Compare: DAC vs. MAC—both assign permissions, but DAC trusts individual judgment while MAC enforces organizational policy. If an exam question asks about government classified systems, MAC is your answer; if it's about a startup's shared drive, think DAC.
These methods go beyond static permission lists, evaluating conditions and attributes at the moment of access. They answer the question: what factors beyond identity should influence access decisions?
Compare: RBAC vs. ABAC—RBAC asks "what's your job title?" while ABAC asks "what's your job title, where are you, what device are you using, and what time is it?" ABAC offers more granularity but requires more sophisticated policy management.
Before any access control model can work, systems must confirm you are who you claim to be. These methods address authentication—the critical first step.
Compare: MFA vs. SSO—MFA increases security friction (more steps to log in) while SSO reduces it (fewer logins overall). Smart implementations use both: SSO for convenience across applications, MFA to protect that single, critical authentication event.
These aren't access control methods per se—they're foundational principles that guide how any access control system should be designed and maintained.
Compare: Least Privilege vs. Separation of Duties—least privilege limits how much one person can access, while separation of duties limits what processes one person can complete alone. Both reduce risk, but they address different threat vectors (over-permissioned accounts vs. insider fraud).
| Concept | Best Examples |
|---|---|
| Owner-controlled permissions | DAC |
| Centrally-enforced policies | MAC |
| Job function-based access | RBAC |
| Context-aware decisions | ABAC, Rule-Based Access Control |
| Identity verification | IBAC, MFA |
| User convenience optimization | SSO |
| Minimizing permission scope | Least Privilege Principle |
| Fraud prevention controls | Separation of Duties |
Which two access control methods both rely on predefined organizational structure, but differ in whether users or administrators assign permissions? What makes each appropriate for different environments?
A healthcare organization needs to restrict access to patient records based on the requesting user's department, the patient's care team assignment, and whether the request originates from inside the hospital network. Which access control method best fits this requirement, and why?
Compare and contrast MFA and SSO in terms of their impact on security posture and user experience. How might an organization implement both without creating conflicting effects?
An FRQ asks you to design access controls for a financial system that processes wire transfers. Which two security principles from this guide are most critical, and how would you implement them?
Why would a government agency handling classified documents choose MAC over RBAC, even though RBAC is generally easier to administer? What specific security requirement does MAC address that RBAC cannot?