IAM Access Control Models 101

These are the basics of IAM access control models. You

1. Role-Based Access Control (RBAC)

RBAC is the most widely adopted access control model due to its simplicity and scalability. It revolves around the concept of roles, which are collections of permissions that define what actions a user can perform. Instead of assigning permissions directly to individual users, roles are assigned to users, simplifying access management.

Example: In a hospital setting, different roles like “Doctor,” “Nurse,” and “Administrator” are defined. Doctors are granted permissions to view and update patient records, while Nurses can view records but not update them. Administrators have broader permissions, including the ability to manage user accounts and system settings. This ensures that each staff member has access only to the information and functionality necessary for their role.

2. Attribute-Based Access Control (ABAC)

ABAC is a more fine-grained access control model that evaluates attributes associated with users, resources, or the environment to determine access rights. It offers greater flexibility and dynamism compared to RBAC.

Example: A financial institution uses ABAC to control access to sensitive customer data. Access is granted based on attributes like the employee’s job title, department, and the customer’s account type. For instance, a policy might state that only employees in the “Wealth Management” department with a “Financial Advisor” title can view high-net-worth customer portfolios. Additionally, access might be restricted to specific IP addresses or timeframes to enhance security.

3. Policy-Based Access Control (PBAC)

PBAC is similar to ABAC but focuses on evaluating policies rather than individual attributes. Policies can be expressed in a high-level language and may incorporate multiple attributes and conditions.

Example: A government agency uses PBAC to manage access to classified documents. Policies are defined to consider factors like the user’s security clearance level, the document’s classification level, and the current threat level. For instance, a policy might dictate that only users with “Top Secret” clearance can access documents classified as “Top Secret” during a “High” threat level.

4. Other Access Control Models

  • Discretionary Access Control (DAC): In DAC, the owner of a resource controls who can access it.
    • Example: In a file-sharing application, the owner of a file can decide who can view, edit, or download it.
  • Mandatory Access Control (MAC): MAC is a more restrictive model often used in government or military settings, where access is determined by security labels.
    • Example: In a military system, access to documents is based on the security clearance level of the user and the classification level of the document.