AC
Access Control is the practice of selectively restricting access to resources, systems, or data based on policies defining who can do what, when, and how.
⚙️ How Does It Work?
Implemented via models like DAC (Discretionary), MAC (Mandatory), RBAC (Role-Based), or ABAC (Attribute-Based). A policy engine evaluates the request against rules and grants or denies it.
📍 Where Is It Used?
Every IT system — operating systems, databases, cloud platforms, SaaS apps — implements some form of access control.
💡 Real-World Example
A hospital uses MAC to ensure only doctors with the right clearance can view patient records, while nurses can only see medication schedules. The OS enforces this automatically without user intervention.
🔗 Related Terms
Stay Ahead in Identity Security
Get weekly IAM, PAM & IGA insights via Identity Pulse.
Subscribe to Identity Pulse →