Differences Between MAC DAC and RBAC Access Network Control Models
Differences Between MAC DAC and RBAC Access Network Control Models
A user may only access a resource if their security label matches the
resource’s security label.
The sharing option in most operating systems is a form of DAC. For each
document you own, you can set read/write privileges and password
requirements within a table of individuals and user groups. System
administrators can use similar techniques to secure access to network
resources.
Advantages of DAC
• Conceptual simplicity — ACLs pair a user with their access
privileges. As long as the user is in the table and has the appropriate
privileges, they may access the resource.
• Responsiveness to business needs — Since policy change
requests do not need to go through a security administration, decision-
making is more nimble and aligned with business needs.
Disadvantages of DAC
• Over/underprivileged users — A user can be a member of multiple,
nested workgroups. Conflicting permissions may over- or under
privilege the user.
• Limited control — Security administrators cannot easily see how
resources are shared within the organization. And although viewing a
resource’s ACL is straightforward, seeing one user’s privileges
requires searching every ACL.
• Compromised security — By giving users discretion over access
policies, the resulting inconsistencies and missing oversight could
undermine the organization’s security posture.
Role-based access control grants access privileges based on the work that
individual users do. A popular way of implementing least-privilege policies,
RBAC limits access to just the resources users need to do their jobs.