Access Control Concepts
A control is a safeguard or defense mechanism intended to protect data's confidentiality, integrity, and availability. Access control involves limiting what objects can be available to what subjects according to what rules. Access control doesn’t just refer to restricting access to information system but also granting access to authorized personnel.
Access is based on this three elements:
Types of Access Controls
Note: Discretion Access Control permission is giving by the owner of an object, while Mandatory Access Control permission is given by security administrators following organizations policy.
Recommended by LinkedIn
The implementation of access control does not only involve system access but covers all access permissions which include access to networks, application and utilities, building access and access to server rooms. All of this actions are access control steps and are part of the layered defense strategy, mostly known as defense in depth.
Defense in depth describes an information security strategy that combines the people, technology, and operations capabilities to initiate various barriers across different layers in an organization. It is advisable to implement this method as it could prevent or deter a cyberattack, but it cannot guarantee that an attack will not occur.
A technical example of defense in depth, in which multiple layers of technical controls are implemented, is when logging into your account requires a username and password, followed by a code sent to your phone to verify your identity. This is a type of multi-factor authentication that employs two layers of authentication: something you have and something you know. An adversary would have to work much harder to obtain the combination of the two layers than either of the authentication codes independently.
Let’s look at a data center, it might have multiple layers of defense. Like, administrative controls, such as policies and procedures. Then logical or technical controls, which include programming to limit access. There are also physical controls, which are sometimes forgotten in our highly technical world. Regardless of how much we focus on cloud computing and virtualization, there is always a physical location where information is being stored or processed in a physical hard drive in a physical computer.
Another very important defense mechanism under access control is the Principle of Least Privilege, this principle states that users and programs should have only minimum privileges necessary to complete their tasks. That is, users are provided access only to systems and programs needed to perform their specific jobs or tasks. This helps to preserve the confidentiality of information and ensures that it is available only to authorized personnels.
An example could be a healthcare environment. Some workers might have access to patient data but not their medical data. Individual doctors might have access only to data related to their own patients. In some cases, this is regulated by law, such as HIPAA in the United States, and by specific privacy laws in other countries.
Systems often monitor access to private information, and if logs indicate that someone has attempted to access a database without the proper permissions, that will automatically trigger an alarm. The security administrator will then record the incident and alert the appropriate people to take action.