Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

5 mins· ·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Authorization and Access Control

Authorization and Access Control

Controlling What Users Can Access

Models, Methods, and Best Practices

What is Authorization?

Authorization is the process of granting or denying access rights and privileges to authenticated users based on their identity and defined permissions.

Key Questions:

  • What can this user access?
  • What actions can they perform?
  • When can they access it?
  • From where can they access it?

Authentication vs Authorization

AspectAuthenticationAuthorization
PurposeVerify identityGrant permissions
QuestionWho are you?What can you do?
ProcessLogin verificationAccess control
WhenBefore accessAfter authentication
ExamplePassword checkFile permissions
Authorization Methods

Access Control Models

  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)
  • Rule-Based Access Control

Discretionary Access Control (DAC)

Principle: Resource owners decide who can access their resources

Characteristics:

  • Owner-controlled permissions
  • Flexible access rules
  • User discretion in sharing
  • Common in file systems

Examples:

  • File permissions (rwx)
  • Shared folders
  • Database table access

DAC Example: File Permissions

Unix/Linux File Permissions:

rwxr-xr--

• Owner: read, write, execute
• Group: read, execute
• Others: read only

Commands:
chmod 754 filename
chown user:group filename

Mandatory Access Control (MAC)

Principle: System enforces strict access policies based on security classifications

Characteristics:

  • System-enforced rules
  • Security labels/classifications
  • No user discretion
  • High-security environments

Classifications:

  • Top Secret
  • Secret
  • Confidential
  • Unclassified

MAC Security Rules

Bell-LaPadula Model:

  • No Read Up: Can't read higher classification
  • No Write Down: Can't write to lower classification

Biba Model:

  • No Read Down: Can't read lower integrity
  • No Write Up: Can't write to higher integrity

Role-Based Access Control (RBAC)

Principle: Access permissions assigned to roles, users assigned to roles

Components:

  • Users: Individuals or systems
  • Roles: Job functions or responsibilities
  • Permissions: Access rights to resources
  • Sessions: Active user-role assignments

RBAC Example: Hospital System

Roles:
• Doctor: View/edit patient records, prescribe medications
• Nurse: View patient records, update vitals
• Administrator: Manage user accounts, system settings
• Billing: Access billing information, insurance data

User Assignment:
Dr. Smith → Doctor role
Nurse Johnson → Nurse role
Admin Brown → Administrator role

RBAC Hierarchy

Role Inheritance: Senior roles inherit permissions from junior roles
Example Hierarchy:

CEO
├── Department Manager
│ ├── Team Lead
│ │ └── Employee
│ └── Senior Employee
└── Project Manager

CEO inherits all permissions from subordinate roles

Attribute-Based Access Control (ABAC)

Principle: Access decisions based on attributes of users, resources, and environment

Attribute Types:

  • Subject: User department, clearance level
  • Resource: File classification, sensitivity
  • Environment: Time, location, network
  • Action: Read, write, delete, execute

ABAC Policy Example

Policy: "Allow access to confidential financial reports if:"

• User is in Finance department
• User has 'Manager' role
• Access during business hours (9 AM - 5 PM)
• From corporate network
• Action is 'read' only

Dynamic Evaluation:
All conditions checked in real-time for each access request

Rule-Based Access Control

Principle: Access granted or denied based on predefined rules

Examples:

  • Firewall rules (IP addresses, ports)
  • Time-based restrictions
  • Location-based access
  • Conditional logic rules
Firewall Rule Example:
"Allow HTTP traffic from 192.168.1.0/24 to web server on port 80 during business hours"

Core Access Control Principles

  • Least Privilege: Minimum necessary access
  • Separation of Duties: Divide critical tasks
  • Need to Know: Access based on job requirements
  • Defense in Depth: Multiple security layers
  • Zero Trust: Never trust, always verify

Principle of Least Privilege

Definition: Grant users only the minimum access rights necessary to perform their job functions

Implementation:

  • Start with no access
  • Add permissions as needed
  • Regular access reviews
  • Remove unused permissions
  • Time-limited access for temporary needs

Benefits:

  • Reduces attack surface
  • Limits breach impact
  • Improves compliance

Separation of Duties

Definition: Divide critical operations among multiple people to prevent fraud and errors

Examples:

  • Financial: Different people for purchase approval and payment
  • IT: Separate development and production access
  • Security: Different administrators for user accounts and permissions

Implementation:

  • Two-person control
  • Dual authorization
  • Workflow approvals

Access Control Matrix

Subject\ObjectFile AFile BDatabasePrinter
AliceRead, WriteRead-Print
BobReadRead, WriteSelect-
Carol-ReadSelect, InsertPrint

Access Control Model Comparison

ModelFlexibilitySecurityComplexityBest For
DACHighMediumLowFile systems
MACLowVery HighMediumMilitary/Government
RBACMediumHighMediumEnterprise
ABACVery HighHighHighComplex environments

Implementation Challenges

  • Role Explosion: Too many specific roles in RBAC
  • Permission Creep: Accumulating unnecessary permissions
  • Complexity: Balancing security and usability
  • Maintenance: Keeping permissions current
  • Compliance: Meeting regulatory requirements
  • Integration: Consistent policies across systems

Modern Access Control Trends

  • Zero Trust Architecture: Verify everything
  • Just-in-Time Access: Temporary elevated permissions
  • Privileged Access Management: Control admin accounts
  • Risk-Based Access: Dynamic decisions based on risk
  • Cloud-Native Controls: API-driven policies

Zero Trust Architecture

Core Principle: "Never trust, always verify"

Key Components:

  • Identity verification for every access
  • Device authentication and validation
  • Micro-segmentation of networks
  • Continuous monitoring and validation
  • Least privilege access enforcement

Access Control Best Practices

  1. Implement principle of least privilege
  2. Regular access reviews and audits
  3. Automate provisioning and deprovisioning
  4. Use role-based access where appropriate
  5. Monitor and log access activities
  6. Separate administrative duties
  7. Plan for emergency access procedures
  8. Train users on security policies

Common Implementation Mistakes

  • Over-privileging: Granting too much access
  • Shared Accounts: Multiple people using same credentials
  • Stale Permissions: Not removing access when no longer needed
  • Weak Reviews: Infrequent or superficial audits
  • Emergency Backdoors: Bypasses without proper controls
  • Poor Documentation: Unclear policies and procedures

Key Takeaways

  • Authorization controls what authenticated users can do
  • Different models suit different security needs
  • Least privilege is fundamental principle
  • Regular reviews prevent permission creep
  • Zero trust is becoming the standard
  • Balance security with operational needs
Remember: Effective access control requires ongoing management, not just initial setup

Thank You

Questions & Discussion

Next: CAPTCHA and Firewall Technologies