Unit 3
Unit 3
Often at workplaces where MAC system is to be used, categorizing the information flow in
different categories like - ground level, confidential, secret and top-secret is suggested. Every
system that an individual might be using would have been given prior access as per the
requirements.
Majorly used in sectors like - government offices, military, health care, financial, engineering
projects, etc.
Advantages Mandatory Access Control (MAC)
• High-level data protection (most secure system among role, mandatory and
discretionary system): With MAC, one can be sure that their most confidential data is
well protected and leaves no room for any leakage.
• Centralized Information: Once data is set in a category it cannot be de-categorized by
anyone other than the head administrator. This makes the whole system centralized and
under the control of only one authority.
• Privacy: Data is set manually by an administrator. No one other than admin can make
changes in category or list of users' accesses to any category. It can be updated only by
admin.
Disadvantages Mandatory Access Control (MAC)
• Careful Setting-Up Process: MAC must be set up with good care otherwise it will
make working chaotic. It is because sometimes a piece of information needs to be
shared among co-workers in the same organization, but MAC restricts anyone to do
so.
• Regular Update Required: It requires regular updating when new data is added, or old
data is deleted. The administration is required to put some consideration into the MAC
system and ACL list now and then.
• Lack of Flexibility: MAC system is not operationally flexible. It is not an easy task to
initially input all data and create an ACL that won’t create any trouble later.
Role-Based Access Control (RBAC)
Role-based access control (RBAC), also known as non-discretionary access control, through
which a company’s management can control access or restrict certain area or information
depending upon the position of the employee in a company or his/her work profile. For
example, if a user is classified as a “Project Engineer,” they will automatically receive
permission from Project Engineers within the system. Implementing RBAC in an
organization requires detailed analysis and consideration before the final implementation.
Once this analysis is done, setting up of RBAC system can become a simpler process.
Advantages Role-based access control (RBAC)
• Improves Work Efficiency:- Using RBAC makes it much easier for office
management to change access according to change in the role of office staff. This is
much more convenient to do rather than administering every entry and exit and
approving every time.
• Security Against any Inside Information Leak:- As the access to certain information
or room will only be given to a certain set of people responsible and trusted, it reduces
any type of leakage of confidential information or even entry of any unwanted
individual.
• Time-Saving:- Under RBAC Management, one would only require a card or password
(according to system functionality) to get access to any information/room. This is
contrary to prior methods wherein security officials use to ask and confirm ones’
credentials and then that person would be allowed to enter after everything seems fine,
which is very time-consuming.
• Helps to Keep Record:- RBAC system not only just ensures safety but, also records
data of entries and exits which makes it easy to analyze work hours as well.
Disadvantages Role-based access control (RBAC)
Improved Security: One of the critical benefits of rule-based access control is improved
security. By using pre-defined rules to regulate access, organizations can ensure that
sensitive information and resources are only accessible to authorized individuals. This
helps to reduce the risk of unauthorized access, theft, or damage to resources.
Rule-Based Access Is Easy To Audit: Another benefit of rule-based access control is the
ease with which you can audit it. Because the rules are stored in a database, administrators
can easily review who has accessed what resources and when. This makes it easier to track
down the source of security incidents and to improve security over time.
Greater Flexibility: Rule-based access control is also more flexible than other forms of
access control. Administrators can easily modify the rules as needed to reflect changes in
the organization or the security landscape. This makes it easier to adapt to changing
security requirements and to keep up with evolving threats.
Disadvantages Rule-based access control (RuBAC)