Page 1060 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1060
Summary
This chapter covered many concepts related to access control models.
Permissions refer to the access granted for an object and determine
what a user (subject) can do with the object. A right primarily refers to
the ability to take an action on an object. Privileges include both rights
and permissions. Implicit deny ensures that access to an object is
denied unless access has been explicitly granted to a subject.
An access control matrix is an object-focused table that includes
objects, subjects, and the privileges assigned to subjects. Each row
within the table represents an ACL for a single object. ACLs are object
focused and identify access granted to subjects for any specific object.
Capability tables are subject focused and identify the objects that
subjects can access.
A constrained interface restricts what users can do or see based on
their privileges. Content-dependent controls restrict access based on
the content within an object. Context-dependent controls require
specific activity before granting users access.
The principle of least privilege ensures that subjects are granted only
the privileges they need to perform their work tasks and job functions.
Separation of duties helps prevent fraud by ensuring that sensitive
functions are split into tasks performed by two or more employees.
A written security policy defines the security requirements for an
organization, and security controls implement and enforce the security
policy. A defense-in-depth strategy implements security controls on
multiple levels to protect assets.
With discretionary access controls, all objects have an owner, and the
owner has full control over the object. Administrators centrally
manage nondiscretionary controls. Role-based access controls use
roles or groups that often match the hierarchy of an organization.
Administrators place users into roles and assign privileges to the roles
based on jobs or tasks. Rule-based access controls use global rules that
apply to all subjects equally. Mandatory access controls require all
objects to have labels, and access is based on subjects having a

