HomeIdentity Security Encyclopedia › Access Control

Access Control

AC

Access Control is the practice of selectively restricting access to resources, systems, or data based on policies defining who can do what, when, and how.

IAM Foundational Security

❓ What is Access Control?

Access Control is the practice of selectively restricting access to resources, systems, or data based on policies defining who can do what, when, and how.

⚙️ How Does It Work?

Implemented via models like DAC (Discretionary), MAC (Mandatory), RBAC (Role-Based), or ABAC (Attribute-Based). A policy engine evaluates the request against rules and grants or denies it.

📍 Where Is It Used?

Every IT system — operating systems, databases, cloud platforms, SaaS apps — implements some form of access control.

💡 Real-World Example

A hospital uses MAC to ensure only doctors with the right clearance can view patient records, while nurses can only see medication schedules. The OS enforces this automatically without user intervention.

🔗 Related Terms

Stay Ahead in Identity Security

Get weekly IAM, PAM & IGA insights delivered to your inbox via Identity Pulse.

Subscribe to Identity Pulse →
Scroll to top