My Blog.

Access Control

  • Purpose: Limits access to systems and data based on user roles and permissions, ensuring that only authorized individuals can access sensitive information.
  • Techniques:
    • Role-Based Access Control (RBAC): Assigns permissions based on user roles within the organization.
    • Attribute-Based Access Control (ABAC): Uses attributes (e.g., user, resource, environment) to determine access.
    • Multi-Factor Authentication (MFA): Requires multiple forms of verification to access systems (e.g., password and biometric).