05.access Control
05.access Control
A B C D
alice 0 0 1 0
subjects
bob 1 1 0 1
charlie 0 0 1 0
dave 1 1 0 1
Objects
A B C D
alice r r/w r -
subjects
bob r r - r/w
charlie - - w -
dave r/w - w
user group other
<Top Secret>
<Secret>
<confidential>
41
42
43
44
45
46
47
48
49
Never Trust. Always verify.
Control Plane
Industry Proponents
Overall Effect
Applicability/Scope
Differentiation
Common Components
Modern Approach to Access Organization Policy
Security Policy
Integrated Threat Intelligence Engine(s)
Continuous Risk
Evaluation
Intrusion Forward/Reverse
Firewall Intranet Resources
Detection/Prevention Proxy
Actions:
• Allow
• Block
User Device
High
Medium
Actions:
Role Health/Integrity Low • Allow
Group Client • Allow Restricted
Device Config • Require MFA
Config Last seen • Block
Location Conditional • Force Remediation
Last Sign-in access risk
Office resource
User Device High
Medium
Anonymous IP