Access Control
Access Control
Access Control
There are two categories of access control: physical and logical. Physical access
control limits access to campuses, buildings, rooms and physical IT assets. Logical
access control limits connections to computer networks, system files and data.
To secure a facility, organizations use electronic access control systems that rely
on user credentials, access card readers, auditing and reports to track employee
access to restricted business locations and proprietary areas, such as data centers.
Some of these systems incorporate access control panels to restrict entry to rooms
and buildings, as well as alarms and lockdown capabilities, to prevent unauthorized
access or operations.
1. Distributed IT systems
2. Policy management
In a competitive market, companies value the agility and flexibility that cloud
workloads offer. Security is often overlooked in a rush to reach a fast time-to-
market. Administrators may grant unnecessary permissions to individual users to
prevent any delays in development. This practice significantly lowers the level of
security provided by the access control system.
RBAC remains the most widely implemented authorization solution. RBAC is easy
to set up and is more suitable for small businesses and firms. Other legacy
authorization systems include mandatory access control (MAC) and discretionary
access control (DAC). These models are often used by military and government
agencies.