Access Control is using security techniques to protect a system against unauthorized access
Access based on attributes
- User attributes
- Object attributes
- Environment conditions
Access based on owner decision - This modal uses an Access Control List (ACL) authorization (ACL is used it to determine who can access resources)
- The data owner of an organization determines the level of access
Access based on how data relates to other data
- Using an organizational query language
Access based on real-time evaluation of a history of activities
- A user declined access to sensitive info because of past behavior
Access based on the identity of the user (this access is by the individual, not by group)
- A specific user has access to sensitive information
Access based on regulations by a central authority
- A user must demonstrate a need for the information before granting access
Access based on a user role
- Job title
Access based on a predefined set of rules or access permissions
- Allowing access to specific IP
Access based on the responsibilities assigned to a user or users
- Data engineer has access to a backup management interface
e1fa805d-5936-4287-9e6d-2a252840792f