Access control
Access control can be used to control authorization once a user has been authenticated. There may be many different requirements; for example, developers may need to share their code with one another. There may be requirements for very strict access control when there are sensitive documents that must be accessed. There may be a requirement to give privileges and rights to administrative role holders or perhaps to give fine-grained access based upon the location or the country of origin of the account holder. In the following section, we will investigate these choices.
Mandatory Access Control (MAC)
MAC is generally seen as the most secure way of controlling access to assets. It requires clearance levels. It requires the data to be classified or labeled. It can be time-consuming but offers the most security. Government agencies such as the Department of Defense and other such entities will typically use this system. Figure 4.8 shows the classification options for...