What Is Access Control?

Access control is the set of mechanisms that determine who can access what, under what conditions, and when. Every access control decision involves three elements:

Access is not granted simply because someone claims to be authorized. Two additional factors shape access decisions: trustworthiness (is the subject who they claim to be?) and need to know (does the subject actually need access to this resource to do their job?).

Defense in Depth

Defense in depth uses multiple, layered security controls to protect an organization's assets. Rather than relying on a single barrier, it places controls at every layer — so if one control fails, others remain in place to contain the damage.

Think of it like a medieval castle: the crown jewels are in a vault, the vault is in a keep, the keep is surrounded by walls, the walls are surrounded by a moat, and guards patrol throughout. Each layer slows an attacker down and increases the chances of detection.

Defense in depth cannot guarantee attacks will never succeed.

Its goal is to make attacks difficult, detectable, and containable — not to make them impossible.

Principle of Least Privilege

Users and programs should have only the minimum access necessary to perform their assigned tasks — nothing more. Every extra permission is an extra opportunity for misuse. An employee who only needs to read financial reports should not have write access to the finance database.

Least privilege reduces the blast radius of a compromised account. If an attacker gains access through a low-privileged account, they can only do limited damage.

Privileged Access Management (PAM)

Some accounts require elevated permissions to perform administrative tasks. These are called privileged accounts and represent a significant security risk if misused. PAM is the practice of controlling and monitoring how administrative privileges are used:

Segregation of Duties

Segregation of Duties (Separation of Duties) ensures that no single person can complete a sensitive organizational process on their own. Critical tasks are divided between two or more people so that collusion is required to abuse the system.

A classic example: the person who initiates a financial transaction should not also be the person who approves it. This control reduces insider threat by forcing any fraudulent activity to require coordination between multiple people.

User Provisioning Lifecycle

User accounts follow a defined lifecycle from creation to deletion. Managing this lifecycle properly is a critical access control function:

Most common gap:

Failing to promptly deactivate accounts when employees leave. A former employee with active credentials is a significant security risk — this scenario appears frequently in exam questions.

Physical Access Controls

Physical access controls are tangible mechanisms that control, direct, or prevent the movement of people and equipment. They are the outermost layer of the defense in depth model. Common examples include: security guards, fences, motion detectors, locked doors and gates, lighting, cable protection, ID badges, cameras, mantraps, turnstiles, and alarms.

Logical Access Controls

Logical access controls (technical controls) are implemented by computer systems to restrict access to digital resources. They can be software-based or hardware-based.

DAC, MAC, and RBAC

Discretionary Access Control (DAC)

In DAC, the owner of a resource decides who can access it and what they can do. The access policy is at the owner's discretion. DAC is flexible but risky — a careless owner may grant excessive permissions.

Mandatory Access Control (MAC)

In MAC, access decisions are enforced by the system according to the organization's security policies — not by individual owners. Users cannot override these controls. MAC is commonly used in high-security environments such as government and military systems. Both the subject and object are assigned security labels; access is only granted when the subject's label meets the requirements for the object's label.

Role-Based Access Control (RBAC)

In RBAC, access permissions are assigned to roles, and users are assigned to roles. A user inherits the permissions of their role. RBAC scales well for large organizations and simplifies access administration, especially when job functions are clearly defined.

Logging and Log Management

Logs are the record of events occurring within an organization's systems and networks. Three key concepts:

Key Terms for the Exam

Term
Definition
Subject
The entity requesting access (user, process, device)
Object
The resource being accessed
Least Privilege
Users receive only the minimum access necessary for their role
PAM
Privileged Access Management — controlling admin credentials
Segregation of Duties
No single person can complete a critical process alone
DAC
Access controlled by the resource owner
MAC
Access controlled by the system per organizational policy
RBAC
Access controlled by role assignment
Mantrap
Double-door entrance preventing tailgating
SIEM
System that collects and correlates log data across the enterprise
Log Anomaly
A suspicious irregularity in log entries