fbpx
Authorization is still an area in which security professionals “mess up more often.”
 
It can be challenging to determine and perpetually monitor who gets access to which data resources, how they should be able to access them, and under which conditions they are granted access, for starters. But inconsistent or weak authorization protocols can create security holes that need to be identified and plugged as quickly as possible.
 
 

Authorization mechanisms are:

  • Role-based access control (RBAC) methods
Also called non-discretionary access control, RBAC grants entry to users based on their role within the organization. This allows you to effortlessly assign permissions based on job titles. Their Job-titles within the company become the basis to assign appropriate access to the appropriate assets.
  • Rule-based access control methods
Rule-Based Access Control is different from Role-Based Access Control. As with DAC, this management style ties access to ACLs. Then, it goes one step further by creating rules that grant access only at certain times of the day or days of the week.
  • Mandatory access control (MAC)
A central authority regulates access rights based on multiple levels of security. MAC involves assigning classifications to system resources and the security kernel or operating system. Only users or devices with the required information security clearance can access protected resources. Organizations like government and military institutions, typically use MAC to classify all end users.
  • Discretionary access control (DAC)
The owner of a protected system or resource sets policies defining who can access it. DAC can involve physical or digital measures, and is less restrictive than other access control systems, as it offers individuals complete control over the resources they own.
 
 
 

This Article Was Written & published by Meena R,  Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India. 

Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...

She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms. 

34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook. 

If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:

Click Here to follow her: Cybersecurity PRISM