What is access control? A key component of data security (2024)

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

What is access control? A key component of data security (1)

Credit: Metamorworks / Getty Images

Who should access your company’s data? How do you make sure those who attempt access have actually been granted that access? Under which circ*mstances do you deny access to a user with access privileges?

To effectively protect your data, your organization’saccess control policy must address these (and other) questions. What follows is a guide to the basics of access control: What it is, why it’s important, which organizations need it the most, and the challenges security professionals can face.

What is access control?

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data.

At a high level, access control is a selective restriction of access to data. It consists of two main components: authentication and authorization, says Daniel Crowley, head of research for IBM’s X-Force Red, which focuses on data security.

Authentication is a technique used to verify that someone is who they claim to be. Authentication isn’t sufficient by itself to protect data, Crowley notes. What’s needed is an additional layer, authorization, which determines whether a user should be allowed to access the data or make the transaction they’re attempting.

Without authentication and authorization, there is no data security, Crowley says. “In every data breach, access controls are among the first policies investigated,” notes Ted Wagner, CISO at SAP National Security Services, Inc. “Whether it be the inadvertent exposure of sensitive data improperly secured by an end user or theEquifax breach, where sensitive data was exposed through a public-facing web server operating with a software vulnerability, access controls are a key component. When not properly implemented or maintained, the result can be catastrophic.”

Any organization whose employees connect to the internet—in other words, every organization today—needs some level of access control in place. “That’s especially true of businesses with employees who work out of the office and require access to the company data resources and services,” says Avi Chesla, CEO of cybersecurity firm empow.

Put another way: If your data could be of any value to someone without proper authorization to access it, then your organization needs strong access control, Crowley says.

Another reason for strong access control: Access mining

The collection and selling of access descriptors on the dark web is a growing problem. For example, a new report from Carbon Black describes how one cryptomining botnet, Smominru, mined not only cryptcurrency, but also sensitive information including internal IP addresses, domain information, usernames and passwords. The Carbon Black researchers believe it is “highly plausible” that this threat actor sold this information on an “access marketplace” to others who could then launch their own attacks by remote access.

These access marketplaces “provide a quick and easy way for cybercriminals to purchase access to systems and organizations…. These systems can be used as zombies in large-scale attacks or as an entry point to a targeted attack,” said the report’s authors. One access marketplace, Ultimate Anonymity Services (UAS) offers 35,000 credentials with an average selling price of $6.75 per credential.

The Carbon Black researchers believe cybercriminals will increase their use of access marketplaces and access mining because they can be “highly lucrative” for them. The risk to an organization goes up if its compromised user credentials have higher privileges than needed.

Access control policy: Key considerations

Most security professionals understand how critical access control is to their organization. But not everyone agrees on how access control should be enforced, says Chesla. “Access control requires the enforcement of persistent policies in a dynamic world without traditional borders,” Chesla explains.Most of us work in hybrid environments where data moves from on-premises servers or the cloud to offices, homes, hotels, cars and coffee shops with open wi-fi hot spots, which can make enforcing access control difficult.

“Adding to the risk is that access is available to an increasingly large range of devices,” Chesla says, including PCs, laptops, smart phones, tablets, smart speakers and other internet of things (IoT) devices. “That diversity makes it a real challenge to create and secure persistency in access policies.”

In the past, access control methodologies were often static. “Today, network access must be dynamic and fluid, supporting identity and application-based use cases,” Chesla says.

A sophisticated access control policy can be adapted dynamically to respond to evolving risk factors, enabling a company that’s been breached to “isolate the relevant employees and data resources to minimize the damage,” he says.

Enterprises must assure that their access control technologies “are supported consistently through their cloud assets and applications, and that they can be smoothly migrated into virtual environments such as private clouds,” Chesla advises. “Access control rules must change based on risk factor, which means that organizations must deploy security analytics layers using AI and machine learning that sit on top of the existing network and security configuration. They also need to identify threats in real-time and automate the access control rules accordingly.”

4 Types of access control

Organizations must determine the appropriate access control modelto adopt based on the type and sensitivity of data they’re processing, says Wagner. Older access models includediscretionary access control (DAC) andmandatory access control (MAC), role based access control (RBAC) is the most common model today, and the most recent model is known asattribute based access control (ABAC).

Discretionary access control (DAC)

With DAC models, the data owner decides on access. DAC is a means of assigning access rights based on rules that users specify.

Mandatory access control (MAC)

MAC was developed using a nondiscretionary model, in which people are granted access based on an information clearance. MAC is a policy in which access rights are assigned based on regulations from a central authority.

Role Based Access Control (RBAC)

RBAC grants access based on a user’s role and implements key security principles, such as “least privilege” and “separation of privilege.” Thus, someone attempting to access information can only access data that’s deemed necessary for their role.

Attribute Based Access Control (ABAC)

In ABAC, each resource and user are assigned a series of attributes, Wagner explains. “In this dynamic method, a comparative assessment of the user’s attributes, including time of day, position and location, are used to make a decision on access to a resource.”

It’s imperative for organizations to decide which model is most appropriate for them based on data sensitivity and operational requirements for data access. In particular, organizations that process personally identifiable information (PII) or other sensitive information types, including Health Insurance Portability and Accountability Act (HIPAA) or Controlled Unclassified Information (CUI) data, must make access control a core capability in their security architecture, Wagner advises.

Access control solutions

A number of technologies can support the various access control models. In some cases, multiple technologies may need to work in concert to achieve the desired level of access control, Wagner says.

“The reality of data spread across cloud service providers and SaaS applications and connected to the traditional network perimeter dictate the need to orchestrate a secure solution,” he notes. “There are multiple vendors providing privilege access andidentity management solutionsthat can be integrated into a traditional Active Directory construct from Microsoft. Multifactor authentication can be a component to further enhance security.”

Why authorization remains a challenge

Today, most organizations have become adept at authentication, says Crowley, especially with the growing use of multifactor authentication and biometric-based authentication (such as facial or iris recognition). In recent years, as high-profile data breaches have resulted in the selling of stolen password credentials on the dark web, security professionals have taken the need for multi-factor authentication more seriously, he adds.

Authorization is still an area in which security professionals “mess up more often,” Crowley says. It can be challenging to determine and perpetually monitor who gets access to which data resources, how they should be able to access them, and under which conditions they are granted access, for starters. But inconsistent or weak authorization protocols can create security holes that need to be identified and plugged as quickly as possible.

Speaking of monitoring: However your organization chooses to implement access control, it must be constantly monitored, says Chesla, both in terms of compliance to your corporate security policy as well as operationally, to identify any potential security holes. “You should periodically perform a governance, risk and compliance review,” he says. “You need recurring vulnerability scans against any application running your access control functions, and you should collect and monitor logs on each access for violations of the policy.”

In today’s complex IT environments, access control must be regarded as “a living technology infrastructure that uses the most sophisticated tools, reflects changes in the work environment such as increased mobility, recognizes the changes in the devices we use and their inherent risks, and takes into account the growing movement toward the cloud,” Chesla says.

Related content

  • brandpostSponsored by SophosStudy: Cybersecurity burnout impacts 88% of cybersecurity and IT roles in Singapore. What can you do as an MSP to help? A staggering 38% of cybersecurity staff in Singapore have resigned from their jobs due to sheer exhaustion – here’s what you can do to help your customers with this problem.BySophosMar 21, 20243 minsCyberattacksSecurity
  • news analysisSiemens, other vendors patch critical ICS product vulnerabilities Some of the flaws outlined in 15 advisories could result in remote code execution on industrial control systems.ByLucian ConstantinMar 20, 20244 minsCritical InfrastructureVulnerabilities
  • newsAI adoption by hackers pushed financial scams in 2023 Pig butchering, inheritance, and humanitarian relief scams jumped in 2023 aided by an AI-backed adversary toolset.ByShweta SharmaMar 20, 20245 minsCyberattacksFraud
  • opinion5 ways private organizations can lead public-private cybersecurity partnerships Public-private partnerships like the US Joint Cyber Defense Collaborative are often led by public agencies, but private-led cybersecurity partnerships might be more effective.ByChristopher WhyteMar 20, 202413 minsCSO and CISOCritical Infrastructure
  • PODCASTS
  • VIDEOS
  • RESOURCES
  • EVENTS

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

What is access control? A key component of data security (2024)

FAQs

What is access control? A key component of data security? ›

Access control is a data security process that enables organizations to manage who is authorized to access corporate data and resources. Secure access control uses policies that verify users are who they claim to be and ensures appropriate control access levels are granted to users.

What is access control in security? ›

Access control is an essential element of security that determines who is allowed to access certain data, apps, and resources—and in what circ*mstances. In the same way that keys and preapproved guest lists protect physical spaces, access control policies protect digital spaces.

What is the key point of access control? ›

The main purpose of access control is to provide a secure environment. Physical access control systems regulate who can enter particular areas, buildings, or rooms. But it's not just about keeping unauthorized people out; it's also about managing and monitoring the flow of people and assets within controlled areas.

Why is access control important in database security? ›

Access control is important because it is a valuable security technique that can be used to regulate who or what can view or use any given resource. In an I.T security setting this could translate to who can access and edit a particular file, what kinds of equipment can be used or who can access certain devices.

What are access control components? ›

Besides the controller, an access control system has two mandatory components (lock and reader) and two optional components (DPI and REX).
  • 1) Lock. ...
  • 2) Reader. ...
  • 3) DPI (Door Position Indicator) ...
  • 4) REX (Request to Exit) ...
  • Wireless locks.

What is an example of access control in security? ›

Access control is a security measure which is put in place to regulate the individuals that can view, use, or have access to a restricted environment. Various access control examples can be found in the security systems in our doors, key locks, fences, biometric systems, motion detectors, badge system, and so forth.

What are the three 3 major components of an access control system? ›

Three elements make up access control: identification, authentication, and authorization. The world of information security is vast. There are many different kinds of attacks and various defenses against them.

What are two uses of an access control? ›

Basically access control is of 2 types:
  • Physical Access Control: Physical access control restricts entry to campuses, buildings, rooms and physical IT assets.
  • Logical Access Control: Logical access control limits connections to computer networks, system files and data.
Mar 26, 2024

What are the benefits of user access control? ›

Access control systems offer several benefits, including:
  • a. Enhanced security. ...
  • b. Increased operational efficiency. ...
  • c. Addressed compliance requirements. ...
  • d. Customized access. ...
  • e. Audit trails. ...
  • f. Integration with other tools.

What is the main purpose of access control quizlet? ›

Purpose of Access Control: The role of Access Control is to control which users can access the resources of a computer system.

What are the four main components of access control? ›

The four central components of access control are users, assets, actions, and features.

What is the first step of access control? ›

In the context of access control, identity is the first step in the authentication and authorization process. To log into a protected resource (network, website, app), a user presents a claim of identity such as a username, which then must be verified by an authentication factor such as a password.

What are the basic steps in access control? ›

Steps of Access Control

There are generally three stages to access control: Identification, Authentication, and Authorization. Identification begins when the entity requesting access makes a claim of identity. This can be typing in a username, showing an ID card, or giving a name to a receptionist.

What are the 4 types of access control? ›

There are four types of access control methods: Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC). A method is chosen based on the level of access needed by each user, security requirement, infrastructure, etc.

What are the three types of security controls? ›

There are three main types of IT security controls including technical, administrative, and physical. The primary goal for implementing a security control can be preventative, detective, corrective, compensatory, or act as a deterrent.

What is the difference between access control and security control? ›

An access control system is actually a way of authorizing access to an area, such as an electronic key or PIN pad, while a security system can provide access control as well as other features such as an alarm system or surveillance.

Top Articles
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 5761

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.