Author:                                                                                                                           Mary K McKee

Policy-Based Access Controls

submited by
Style Pass
2021-09-26 18:00:09

Author: Mary K McKee (Duke University)

The natural evolution of access controls has caused many organizations to adopt access management paradigms that assign and revoke access based on structured and highly reproducible rules.   One such paradigm is known as Policy-Based Access Control (PBAC), which is most differentiated by two key characteristics: 1. Where other access control paradigms often optimize for ease of granting user access to all relevant resources, PBAC optimizes for ease of extending resource access to all applicable users.   2. PBAC facilitates the evaluation of context (time of day, location, etc.) in granting access to a protected resource.  Context is used to express who may access a resource and the conditions under which that access is permissible. Shifting the focus of access controls from the user to the resource allows PBAC systems to be particularly resilient against shifts in organizational structure or regulatory obligations.  The inclusion of context (such as an authorized user’s location or device) allows for additional security controls to be expressed and extended within resource permissions themselves, ensuring that all facets of access control are contained and auditable within a single structure. Because PBAC accommodates a very precise expression of who may access a resource and under which circumstances, it lends itself to the automation of access provisioning and deprovisioning in a way that provides ease of management as well as increased security and adaptability.

Introduction Access control systems provide security and privacy around organizational assets, but they need to be engineered for rapid shifts in technology, regulatory obligations, and organizational structure to do so effectively.  Strategies that worked well for limited and largely on-premises information technology infrastructure fare poorly in this age of cloud services, federated identity, and advanced cyber threats.

Leave a Comment