CompTIA Security+ (SY0-601): Access Control
This section outlines different access control models including Discretionary (DAC), Mandatory (MAC), Rule-Based, and Lattice-Based systems. It emphasizes how permissions are assigned—either by object owners or enforced system-wide through security labels—and the role of structured models in securing sensitive environments.
DAC
Discretionary Access Control:
The access control policy is determined by the owner
DAC is used commonly
Every object in a system must have an owner
Each owner determines access rights and permissions for each object
Key Terms
DAC
Discretionary Access Control:
The access control policy is determined by the owner
DAC is used commonly
Every object in a syste...
MAC
Mandatory Access Control:
An access control policy where the computer system determines the access control for an object
Rule-Based Access Control
Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label
Lattice-Based Access Control
Utilizes complex mathematics to create sets of objects and subjects to define how they interact
Mandatory Access Con...
RBAC
Role-Based Access Control:
An access model that is controlled by the system (like MAC) but utilizes a set of permissions instead of a single dat...
ABAC
Attribute-Based Access Control:
An access model that is dynamic and context-aware using IF-THEN statements
Most s...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
DAC | Discretionary Access Control:
|
MAC | Mandatory Access Control: MAC relies on security labels being assigned to every user (called a subject) and every file/folder/device or network connection (called an object) Data labels create trust levels for all subjects and objects MAC is implemented through the Rule-based and the Latticebased access control methods |
Rule-Based Access Control | Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label |
Lattice-Based Access Control | Utilizes complex mathematics to create sets of objects and subjects to define how they interact Mandatory Access Control is a feature in FreeBSD & SELinux Only in high security systems due to its complex configuration |
RBAC | Role-Based Access Control: Power Users is a role-based permission |
ABAC | Attribute-Based Access Control: Most specific/detailed access control If Jason is in HR, then give him access to \fileserver\HR |
chmod | Bash command used to change file permissions R (Read) = 4
|
Privilege Creep | Occurs when a user gets additional permission over time as they rotate through different positions or roles Privilege creep violates the principles of least privilege |
Permissions | Permissions are inherited by default from the parent when a new folder is created Any permissions added/removed from the parent folder will pass to the child by default too! Use Groups for roles and do not assign users directly to a folder’s permissions If you copy a folder, then permissions are inherited from the parent folder it is copied into |