gptkbp:instanceOf
|
Security Mechanism
|
gptkbp:appliesTo
|
gptkb:Files
Networks
Applications
Physical Spaces
|
gptkbp:canBe
|
Physical
Logical
Administrative
|
gptkbp:component
|
gptkb:Identity_and_Access_Management_(IAM)
Access Management
Security Policy
|
gptkbp:controls
|
User Permissions
Resource Access
|
gptkbp:enables
|
gptkb:Least_Privilege_Principle
gptkb:Separation_of_Duties
Compliance
Data Protection
|
gptkbp:enforcedBy
|
gptkb:Access_Control_List_(ACL)
Policies
Capabilities
|
gptkbp:example
|
Access Badges
Multi-factor Authentication
Firewall Rules
Keycard Entry
Password Protection
Security Groups
Biometric Access
Access Tokens
Permission Sets
User Roles
|
gptkbp:hasType
|
gptkb:Role-Based_Access_Control_(RBAC)
gptkb:Attribute-Based_Access_Control_(ABAC)
gptkb:Discretionary_Access_Control_(DAC)
gptkb:Mandatory_Access_Control_(MAC)
|
https://www.w3.org/2000/01/rdf-schema#label
|
Access Control (AC)
|
gptkbp:prevention
|
Unauthorized Access
|
gptkbp:purpose
|
Restrict Access to Resources
|
gptkbp:relatedStandard
|
gptkb:NIST_SP_800-53
gptkb:ISO/IEC_27001
|
gptkbp:relatedTo
|
gptkb:audit
Authorization
Authentication
Confidentiality
Integrity
|
gptkbp:usedIn
|
gptkb:Information_Security
Computer Systems
Physical Security
|
gptkbp:bfsParent
|
gptkb:NIST_Special_Publication_800-53
|
gptkbp:bfsLayer
|
6
|