CISSP · · 4 min read

Access Control Models: DAC, MAC, RBAC, ABAC, and Choosing the Right One

DAC, MAC, RBAC, and ABAC each solve different access problems. Learn how to choose the right model for your CISSP exam scenarios and real world designs.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Access Control Models: DAC, MAC, RBAC, ABAC, and Choosing the Right One

Hook / Why this matters

Access control models determine who can grant access, how policies are enforced, and how well security scales as your environment grows. Pick the wrong model and you either drown in administrative work or end up with far more access than is safe. For the CISSP exam and real world design, you must be able to choose the right model for each context.

Core concept explained simply

An access control model is a conceptual way of deciding who can access which resources under what conditions. It defines who makes the decision and what rules they follow.

The main models you need for CISSP are:

Discretionary Access Control (DAC)

In DAC, the resource owner decides who gets access. Typical characteristics:

DAC is flexible and familiar. Most desktop operating systems use DAC for local files. The downside is that owners may grant access too broadly, creating over sharing and weakening confidentiality.

Mandatory Access Control (MAC)

MAC is used where strict confidentiality is required, such as military or some government systems. In MAC:

The key idea is that the system, not the user, decides. This provides strong control but is less flexible and harder to manage for general business environments.

Role Based Access Control (RBAC)

RBAC organizes access around job functions instead of individuals.

This model scales well in enterprises, because you change role permissions or user role memberships instead of managing access object by object. RBAC supports least privilege when roles are carefully designed.

Attribute Based Access Control (ABAC)

ABAC goes further by making decisions based on attributes of subjects, objects, actions, and context. Attributes might include:

Policies in ABAC express rules such as, "Allow doctors to view patient records for patients they are assigned to during scheduled shifts." This provides very granular and dynamic control, but requires well managed attribute data and a capable policy engine.

Rule based access control

Rule based access focuses on conditions instead of identity. Firewalls are a classic example, using rules like "allow HTTP outbound from this subnet".

Rule based logic also appears inside RBAC or ABAC systems when policies refer to time, location, or other conditions.

Combining models

Most organizations do not use a single model everywhere. Common combinations include:

CISSP lens

From an exam perspective, focus on the defining characteristic of each model:

Exam questions often describe a scenario and ask which model is most appropriate. Pay attention to:

Also remember that RBAC is the dominant enterprise model, and MAC is the most restrictive, least flexible approach.

Real world scenario

A healthcare provider originally used DAC file shares for patient records. Department heads controlled access to shared folders and often granted access broadly for convenience.

An internal review found that more than 40 percent of staff had access to records for patients they had no relationship with. This violated privacy regulations and internal policy.

The organization redesigned access using RBAC and ABAC:

Ownership based sharing was removed for regulated data. Users still had DAC style control for low risk collaboration folders, but sensitive health information moved to centralized, policy based access.

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: A government agency handles top secret data and must prevent users from downgrading or sharing information outside approved channels. Which access control model best fits this requirement, and why

Answer: Mandatory Access Control. MAC assigns classification labels to data and clearance labels to users, and the system enforces access rules centrally. Users cannot change labels or bypass policy, which protects against unauthorized downgrading or sharing of classified information.

Read next

© 2025 Threat On The Wire. All rights reserved.