Dynamic access control implements a three-pronged approach to data governance: claims, classification, and policy. Each of these components come together to provide contextual access control that can be adjusted and updated in real-time.
Claims
Claims are Active Directory attributes that define levels of user access. They can be further broken down into user claims, device claims, and resource attributes. User claims are directly associated with a specific user and can be any piece of unique information, such as an employee’s department, user behavior, or general security clearance. Device claims are tied to the device being used for access, and can indicate device health, location, time of access, and network utilization. Finally, resource attributes are tied directly to network resources and can be used globally for authorization decisions.
Classification
Dynamic access control allows network administrators to classify data with custom taxonomy tags. These tags enable computers to draw connections between data that otherwise wouldn’t be apparent and are crucial for dynamic access control’s context awareness.
Central Access Policy
This is where claims and classification come together. Administrators can define authorization policies based on dynamic combinations of user/device claims, resource attributes, and classification tags. For instance, access to data tagged as personally identifiable information can be restricted to HR employees (user claim) working in-office (device claim). This policy can then be implemented company-wide so long as the claims and classifications exist on all servers.
Identity and Access Management (IAM) Integration
Dynamic access control can be used to supplement and enhance an organization’s IAM systems. These are centralized hubs used to manage data access across an entire organization. By integrating dynamic access control data, the IAM system can implement dynamic variables and context awareness across all network APIs.
Dynamic Access Control vs. Traditional Access Control
Dynamic access control is not the only approach to access control out there. How does it compare to some traditional methods, such as Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC)?
The main difference is that RBAC and ABAC are static control models. RBAC assigns degrees of access to specific user roles and grants that access to anyone with that role. ABAC expands this approach, basing access on the attributes of a user, the resource they’re trying to access, the action the user wants to take with that resource, and the environment (device, encryption, communication protocol) in which the access is taking place. Unlike dynamic access control, these models cannot respond dynamically to variables such as anomalous user behavior or taxonomy classifications.