Understanding the Four Access Control Models

What Are the 4 Types of Access Control?

Introduction

Access control is a fundamental concept in security, governing how individuals gain permission to access physical locations, digital systems, or sensitive information. Whether applied to an office building, a computer network, or confidential records, access control ensures that only authorised users can enter or interact with protected resources.

At the heart of access control are four recognised access control models. These models define how permissions are assigned, enforced, and managed. Each type has its own strengths, limitations, and ideal use cases.

This article provides a detailed explanation of the four types of access control, how they work, where they are used, and how organisations decide which model is most suitable.


What Is an Access Control Model?

An access control model is a structured method for determining:

  • Who can access a resource
  • What actions they can perform
  • Under what conditions access is allowed

Access control models are applied to both physical security (doors, gates, restricted areas) and logical security (files, systems, networks).

The four main types of access control are:

  1. Discretionary Access Control (DAC)
  2. Mandatory Access Control (MAC)
  3. Role-Based Access Control (RBAC)
  4. Attribute-Based Access Control (ABAC)

Overview of the 4 Types of Access Control

TypeControl AuthorityFlexibilitySecurity Level
Discretionary (DAC)Resource ownerHighModerate
Mandatory (MAC)Central authorityLowVery high
Role-Based (RBAC)OrganisationMediumHigh
Attribute-Based (ABAC)System logicVery highVery high

Each model approaches access decisions differently, depending on how much control is given to users versus the system.


1. Discretionary Access Control (DAC)

What Is Discretionary Access Control?

Discretionary Access Control (DAC) is an access model where the owner of a resource decides who can access it. The system allows users to grant or revoke access permissions at their discretion.

In DAC systems, access rights are typically tied to user identities and ownership.


How DAC Works

  • A user creates or owns a resource
  • That user decides who else can access it
  • Permissions can usually be modified or shared

DAC Permission Example

UserResourcePermission
AliceFile ARead / Write
BobFile ARead only
CharlieFile ANo access

Where DAC Is Commonly Used

  • Personal computers
  • Small business networks
  • File-sharing environments
  • Basic operating systems

Advantages of DAC

  • Easy to understand and manage
  • Highly flexible
  • Minimal administrative overhead

Disadvantages of DAC

  • Increased risk of permission misuse
  • Difficult to audit in large systems
  • Vulnerable to insider threats

Security Considerations

Because users control permissions, DAC systems rely heavily on user awareness and responsibility. Accidental sharing or poor permission management can lead to security breaches.


2. Mandatory Access Control (MAC)

What Is Mandatory Access Control?

Mandatory Access Control (MAC) is the most restrictive access control model. Access decisions are enforced by a central authority, and users cannot change permissions.

In MAC systems, resources and users are assigned security labels, and access is granted only if predefined rules allow it.


How MAC Works

  • Each user has a security clearance
  • Each resource has a classification level
  • Access is granted only if clearance matches classification

MAC Classification Example

Classification LevelAccess Rights
Top SecretFull access
SecretLimited access
ConfidentialRestricted access
PublicOpen access

Where MAC Is Commonly Used

  • Government systems
  • Military environments
  • Highly regulated industries
  • Critical infrastructure

Advantages of MAC

  • Extremely high security
  • Centralised control
  • Strong resistance to insider threats

Disadvantages of MAC

  • Very rigid
  • Difficult to modify permissions
  • Requires extensive planning and maintenance

Security Considerations

MAC systems prioritise security over convenience. Even trusted users cannot override system rules, reducing the risk of data leakage or unauthorised access.


3. Role-Based Access Control (RBAC)

What Is Role-Based Access Control?

Role-Based Access Control (RBAC) assigns access permissions based on job roles rather than individual users. Users inherit permissions associated with their role within an organisation.

This model is widely used because it balances security with manageability.


How RBAC Works

  • Roles are defined (e.g., Manager, Technician, Administrator)
  • Permissions are assigned to roles
  • Users are assigned one or more roles

RBAC Role Example

RoleTypical Permissions
AdministratorFull system access
ManagerReporting and approval
EmployeeStandard operational access
VisitorLimited access

Where RBAC Is Commonly Used

  • Corporate IT systems
  • Physical access systems
  • Healthcare and education
  • Enterprise software platforms

Advantages of RBAC

  • Easy to scale
  • Simplifies user management
  • Supports compliance requirements

Disadvantages of RBAC

  • Role definition can become complex
  • Risk of “role creep” over time
  • Less flexible than attribute-based systems

Security Considerations

RBAC is effective when roles are clearly defined and regularly reviewed. Poor role management can result in excessive permissions being granted.


4. Attribute-Based Access Control (ABAC)

What Is Attribute-Based Access Control?

Attribute-Based Access Control (ABAC) is the most dynamic and flexible access control model. Access decisions are based on attributes rather than fixed roles or ownership.

Attributes can relate to users, resources, actions, or environmental conditions.


How ABAC Works

Access decisions may consider:

  • User attributes (department, clearance)
  • Resource attributes (data sensitivity)
  • Environmental attributes (time, location)

ABAC Decision Example

AttributeValue
User departmentFinance
Access time09:00–17:00
LocationOffice network
Resource sensitivityMedium

Access is granted only if all conditions are met.


Where ABAC Is Commonly Used

  • Large enterprises
  • Cloud-based systems
  • Complex regulatory environments
  • Advanced physical security systems

Advantages of ABAC

  • Extremely flexible
  • Highly granular control
  • Supports complex security policies

Disadvantages of ABAC

  • Complex to design and manage
  • Requires advanced systems
  • Higher implementation cost

Security Considerations

ABAC provides strong security but requires careful planning. Poorly defined attributes can lead to unexpected access decisions.


Comparing the Four Types of Access Control

FeatureDACMACRBACABAC
User controlHighNoneLowNone
Centralised managementLowHighHighVery high
FlexibilityHighLowMediumVery high
ScalabilityLowMediumHighVery high
Security strengthMediumVery highHighVery high

Physical vs Logical Use of the 4 Models

Each model can be applied to physical and digital environments.

Examples

ModelPhysical ExampleLogical Example
DACOffice keys shared by ownerFile permissions
MACSecure government facilityClassified databases
RBACStaff ID cards by job roleBusiness software access
ABACTime-based door accessCloud system rules

Cost Considerations

Access control costs vary depending on the model used.

Indicative Cost Comparison (£)

ModelSetup Cost (£)Ongoing Cost (£/year)
DAC500–1,500300
MAC5,000–15,0003,000
RBAC3,000–8,0001,500
ABAC8,000–20,0004,000

Figures are indicative and shown in pounds (£).


Choosing the Right Access Control Model

The right model depends on:

  • Organisation size
  • Security requirements
  • Regulatory obligations
  • Budget
  • Operational complexity

Many organisations use hybrid approaches, combining models to balance security and usability.

Professional access control strategies are often discussed within security-focused environments such as https://williamhale.co.uk/, where tailored solutions are considered based on risk and operational needs.


Common Mistakes When Implementing Access Control

  • Granting excessive permissions
  • Failing to revoke access promptly
  • Ignoring audit logs
  • Poor role or attribute design
  • Infrequent access reviews

Avoiding these mistakes is just as important as choosing the right model.


Future Trends in Access Control Models

Access control continues to evolve:

TrendImpact
Cloud-native access controlIncreased scalability
AI-driven policiesSmarter access decisions
Behaviour-based attributesContinuous authentication
Zero Trust modelsNo implicit trust

These developments often rely heavily on ABAC principles.


Conclusion

The four types of access control — DAC, MAC, RBAC, and ABAC — form the foundation of modern security systems. Each model offers a different balance between control, flexibility, and security.

  • DAC prioritises user control
  • MAC prioritises absolute security
  • RBAC prioritises organisational efficiency
  • ABAC prioritises flexibility and precision

Understanding these models allows organisations to design access control systems that protect assets, comply with regulations, and support efficient operations.

When implemented correctly and reviewed regularly, access control is not just a security measure — it is a strategic asset.

21. Hybrid Access Control Models

In practice, many organisations do not rely on just one access control model. Instead, they adopt hybrid access control, combining elements of DAC, MAC, RBAC, and ABAC to meet operational and security needs.

Hybrid Model Example

ScenarioModel Used
Job-based permissionsRBAC
Time-based accessABAC
Classified dataMAC
Personal file ownershipDAC

Hybrid approaches allow organisations to apply strict controls where necessary while maintaining flexibility elsewhere.


22. Access Control and the Principle of Least Privilege

The principle of least privilege underpins all four access control models. It states that users should be granted only the minimum level of access required to perform their duties.

Benefits of Least Privilege

  • Reduced attack surface
  • Lower risk of accidental misuse
  • Improved accountability
  • Easier auditing

Least Privilege Example

RoleRequired AccessUnnecessary Access
Accounts clerkInvoicing systemPayroll admin
TechnicianMaintenance toolsHR records

Applying this principle strengthens all access control models.


23. Access Control Reviews and Lifecycle Management

Access control must be actively managed throughout the user lifecycle — from onboarding to departure.

Key Lifecycle Stages

  1. New user creation
  2. Role or responsibility changes
  3. Temporary access assignments
  4. Offboarding and access removal

Review Frequency Table

Access TypeReview Interval
Standard user accessQuarterly
Privileged accessMonthly
Temporary accessWeekly
Dormant accountsImmediate action

Regular reviews prevent outdated or excessive permissions.


24. Measuring the Effectiveness of Access Control

An effective access control system should be measurable. Metrics help organisations understand whether controls are working as intended.

Key Performance Indicators (KPIs)

MetricPurpose
Failed access attemptsDetect potential threats
Access violationsIdentify policy gaps
Time to revoke accessMeasure response efficiency
Audit findingsAssess compliance

These measurements support continuous improvement and risk reduction.


25. Access Control as Part of a Wider Security Strategy

Access control is most effective when integrated into a broader security framework, alongside surveillance, monitoring, incident response, and staff training.

Rather than functioning in isolation, access control supports organisational resilience by ensuring that security policies are consistently enforced across people, systems, and environments. When aligned with risk assessments and governance processes — as explored in professional security discussions such as those found at https://williamhale.co.uk/ — access control becomes a long-term strategic safeguard rather than a standalone control.

Call Now Button