Access Control
Access Control
Access control is a security technique that regulates who or what can view or use
resources in a computing environment. It is a fundamental concept in security
that minimizes risk to the business or organization.
There are two types of access control: physical and logical. Physical access control
limits access to campuses, buildings, rooms and physical IT assets. Logical access
control limits connections to computer networks, system files and data.
To secure a facility, organizations use electronic access control systems that rely
on user credentials, access card readers, auditing and reports to track employee
access to restricted business locations and proprietary areas, such as data centers.
Some of these systems incorporate access control panels to restrict entry to rooms
and buildings, as well as alarms and lockdown capabilities, to prevent unauthorized
access or operations.
The best practice of least privilege restricts access to only resources that employees
require to perform their immediate job functions.
Challenges of access control
Many of the challenges of access control stem from the highly distributed nature of
modern IT. It is difficult to keep track of constantly evolving assets as they are
spread out both physically and logically. Some specific examples include the
following:
The process that companies struggle with more is authorization, which is the act of
giving individuals the correct data access based on their authenticated identity. One
example of where this might fall short is if an individual leaves a job but still has
access to that company's assets. This can create security holes because the asset the
individual uses for work -- a smartphone with company software on it, for example
-- is still connected to the company's internal infrastructure but is no longer being
monitored because the individual is no longer with the company. Left unchecked,
this can cause problems for an organization.
If the ex-employee's device were to be hacked, the hacker could gain access to
sensitive company data unbeknownst to the company because the device is no
longer visible to the company in many ways but still connected to company
infrastructure. The hacker may be able to change passwords, view sensitive
information or even sell employee credentials or consumer data on the dark web
for other hackers to use.
One solution to this problem is strict monitoring and reporting on who has access
to protected resources so that, when a change occurs, it can be immediately
identified and access control lists (ACLs) and permissions can be updated to reflect
the change.
Another often overlooked challenge of access control is the user experience (UX)
design of access control technologies. If a particular access management
technology is difficult to use, an employee may use it incorrectly or circumvent it
entirely, which creates security holes and compliance gaps. If a reporting or
monitoring application is difficult to use, then the reports themselves may be
compromised due to an employee mistake, which then would result in a security
gap because an important permissions change or security vulnerability went
unreported.
Microsoft Active Directory (AD) is one example of software that includes most of
the tools listed above in a single offering. Other vendors with popular products for
identity and access management (IAM) include IBM, Idaptive and Okta.