The process or an technique to implement restriction or adding addition form of security to prevent un-authorized user from both physical and informational assets.
ACL generally describes who or what can use or view the resource this specific technique helps to add some basic underlying security to any forms of assets.
Type of ACL
Physical Access Control
Logical Access Control
Physical Access Control
The process of safeguarding the physical assets such as Computer, servers, network devices and much more from un-authorized intruders by implementing various strategies.
Logical Access Control
The process of safeguarding the logical assets such as information, printed copies, data and much more from un-authorized intruders by implementing various strategies.
Implementing ACL
Implementing access based restriction can be achieved by three major types
Identification
Authentication
Authorization
Identification
The techniques used to identified the authorized user, this specific techniques can be achieved by implementing unique ID to the user. Ex: EMP01222
Authentication
The techniques used to validate the authorized user, this specific techniques can be achieved by implementing passwords, fingerprints, face reorganization, etc.
Authorization
The techniques used to set/assign privileges to the authorized user, this specific techniques can be achieved by Privileged Account Management (PAM)
Components of ACL
Mandatory Access Control
Discretionary Access Control
Role Based Access Control
Rule Based Access Control
Attribute Based Access Control
Summary
ACL : Access Control List is an process or an technique to implement restriction or adding addition form of security to prevent un-authorized user from both physical and informational assets, this can be achieved by three major types
Identification
Authentication
Authorization
Comentários