Defines what an authenticated person can do with that data. e.g. user roles, or permissions
Network Access Control (NAC)
- Create policies for what individual systems can do on the network.
Access Control List (ACL)
- Clearly defined list of permissions a user has on a system
- ACL access models:
- Mandatory Access Control (MAC) Every resource is assigned a label that defines its security level.
- Discretionary Access Control (DAC) Based on the idea that a resource has an owner who may at their discretion assign access to that resource.
- Role-Based Access Control (RBAC)
- Most popular
- Users are placed in groups and groups have different access to things.