Access Control

AC

Access Control is the practice of selectively restricting access to resources, systems, or data based on policies defining who can do what, when, and how.

⚙️ How Does It Work?

Implemented via models like DAC (Discretionary), MAC (Mandatory), RBAC (Role-Based), or ABAC (Attribute-Based). A policy engine evaluates the request against rules and grants or denies it.

📍 Where Is It Used?

Every IT system — operating systems, databases, cloud platforms, SaaS apps — implements some form of access control.

💡 Real-World Example

A hospital uses MAC to ensure only doctors with the right clearance can view patient records, while nurses can only see medication schedules. The OS enforces this automatically without user intervention.

🔗 Related Terms

RBAC ABAC DAC MAC Least Privilege

Stay Ahead in Identity Security

Get weekly IAM, PAM & IGA insights via Identity Pulse.

Subscribe to Identity Pulse →
Scroll to top