Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?

What is role-based access control?

Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.

RBAC ensures employees access only information they need to do their jobs and prevents them from accessing information that doesn't pertain to them.

An employee's role in an organization determines the permissions that individual is granted and ensures lower-level employees can't access sensitive information or perform high-level tasks.

In the role-based access control data model, roles are based on several factors, including authorization, responsibility and job competency. As such, companies can designate whether a user is an end user, an administrator or a specialist user. In addition, access to computer resources can be limited to specific tasks, such as the ability to view, create or modify files.

Limiting network access is important for organizations that have many workers, employ contractors or permit access to third parties, like customers and vendors, which makes it difficult to monitor network access effectively. Companies that depend on RBAC are better able to secure their sensitive data and critical applications.

Benefits of RBAC

There are multiple benefits to using RBAC, including:

  • Improving operational efficiency. With RBAC, companies can decrease the need for paperwork and password changes when they hire new employees or switch the roles of existing employees. RBAC lets organizations quickly add and change roles, as well as implement them across platforms, operating systems (OSes) and applications. It also cuts down on the potential for error when assigning user permissions. Additionally, with RBAC, companies can more easily integrate third-party users into their networks by giving them predefined roles.
  • Enhancing compliance. Every organization must comply with local, state and federal regulations. Companies generally prefer to implement RBAC systems to meet the regulatory and statutory requirements for confidentiality and privacy because executives and IT departments can more effectively manage how the data is accessed and used. This is particularly important for financial institutions and healthcare companies that manage sensitive data.
  • Giving administrators increased visibility. RBAC gives network administrators and managers more visibility and oversight into the business, while also guaranteeing authorized users and guests on the system are only given access to what they need to do their jobs.
  • Reducing costs. By not allowing user access to certain processes and applications, companies may conserve or more cost-effectively use resources, such as network bandwidth, memory and storage.
  • Decreasing risk of breaches and data leakage. Implementing RBAC means restricting access to sensitive information, thus reducing the potential for data breaches or data leakage.

Best practices for role-based access control implementations

There are a number of best practices organizations should follow for implementing RBAC, including:

  • Determine the resources for which companies need to control access, if they're not already listed -- for instance, customer databases, email systems and contact management systems.
  • Analyze the workforce and establish roles that have the same access needs. However, don't create too many roles because that would defeat the purpose of role-based access control and create user-based access control instead. Some RBAC examples include a basic role that includes the access every employee needs, such as to email and the corporate intranet. Another role could be that of a customer service representative who would have read/write access to the customer database. Another role could be that of a customer database admin with full control of the customer database.
  • After creating a list of roles and their access rights, align the employees to those roles, and set their access.
  • Evaluate how roles can be changed, as well as how to close accounts for those leaving the company and how to register new employees.
  • Ensure RBAC is integrated across all systems throughout the company.
  • Conduct training so employees understand the principles of RBAC.
  • Periodicallyconduct audits of the roles, so the employees who are assigned to them and the access that's permitted for each role. If a role is found to have unnecessary access to a certain system, change the role and modify the access level.
Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?
Role-based access controls ensure employees only have access to the processes and programs necessary.

RBAC vs. ABAC

Role-based access control and attribute-based access control (ABAC) are both types of access control methods, but their approaches are different.

While RBAC grants access rights depending on the roles of users, ABAC controls access based on a combination of attributes, i.e., user attributes, resource attributes, attributes associated with the system or application to be accessed and environmental attributes.

User attributes may include name, nationality, organization, ID, role and security clearance. Examples of resource attributes include owner, name and data creation date, while environmental attributes include access location, time of access and threat levels.

In addition to simplifying access management, ABAC enables companies to reduce risks from unauthorized access and helps to centralize auditing.

Organizations should use RBAC for coarse-grained access control, such as giving all professors in a university access to Google for doing research or giving all contractors access to corporate email. On the other hand, companies should use ABAC for fine-grained access control or if they need to make decisions under specific conditions, e.g., giving professors access to Google only if they work in building X and teach freshman classes.

This was last updated in September 2021

Continue Reading About role-based access control (RBAC)

  • What is identity and access management? Guide to IAM
  • Learn to identify and prevent access control attacks
  • Face the challenges of secure cloud access control
  • Be selective with Kubernetes RBAC permissions
  • How to fortify IoT access control to improve cybersecurity

Dig Deeper on Identity and access management

  • Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?
    access control

    Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?

    By: Ben Lutkevich

  • Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?
    Confluent secures event data streaming in cloud update

    Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?

    By: Sean Kerner

  • Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?
    5 key elements of data tenancy

    Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?

    By: Jeff McCormick

  • Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?
    XACML (Extensible Access Control Markup Language)

    Which access control model allows the owner of a resource to establish privileges to the information they own and has non mandatory labels?

    By: Katie Terrell Hanna

Which access control model allows owners to determine who can access the files?

1. Mandatory Access Control (MAC) The Mandatory Access Control (MAC) model gives only the owner and custodian management of the access controls.

What access control model allows the owner of the resources to define what users may access it?

Discretionary Access Control (DAC) – DAC is a type of access control system that assigns access rights based on rules specified by users. The principle behind DAC is that subjects can determine who has access to their objects.

What are the 4 types of access control?

4 Types of Access Control.
Discretionary Access Control (DAC) ... .
Mandatory Access Control (MAC) ... .
Role-Based Access Control (RBAC) ... .
Rule-Based Access Control. ... .
Access Control from Four Walls Security..

What are the 3 types of access control?

Access control systems come in three variations: Discretionary Access Control (DAC), Managed Access Control (MAC), and Role-Based Access Control (RBAC).