RBAC And Access Control Systems

RBAC or Role Based Access Control is a network security system  designed to restrict system access depending on the designation/ role of a person in an organization. 


The working mechanism of RBAC involves setting permissions and privileges, which defines the user access to the systems and automatically restricts it.


The main idea behind using role based access control is to safeguard sensitive and crucial information.


When using RBAC, the leading authorities of an organization assign each working employee a role and determine their position in the functional space, hence deciding how much data access needs to be provided to them. However, this security system is mostly used in big institutions.  


Depending on a role one has occupied in the RBAC, one can read, edit, or delete articles in a writing application.



Role-based access control has two roles, namely:

  • Writer: A writer has the right to edit, delete and read. 
  • Reader: A reader can only read the documents.

 


ACCESS CONTROL

 

When using RBAC, the access control to the system is also divided into two categories, based on who can view, read,

and edit. 


Implementing access control systems is necessary to avoid and minimize data breaching.




Two access control systems involved are:


Discretionary Access Control - You can define Discretionary Access Control (DAC) as the mind or person

behind defining the set of policies and access restrictions. 


DAC can also include physical and digital measures. It is less restrictive than rest access control systems, which

makes it less secure. 


Mandatory Access Control - When it comes to Mandatory Access Control (MAC), an authority figure is responsible for regulating the access

rights based on the multiple levels of security. 


If you are working with Mandatory Access Control, you have to assign classifications to system resources, security

kernel, and operating system. In a MAC system, only users with the required information and permission can access

the data. 


Comments

Popular posts from this blog

How does Radius Authentication Work Take Place?

What's the point of Role Based Access Control?

Secure Your Data From Hacker With RBAC System