Access Control System

GPTKB entity

Statements (150)
Predicate Object
gptkbp:instanceOf gptkb:security
gptkb:software
Security System
computer security concept
Security Model
gptkbp:abbreviation gptkb:ACL
gptkbp:alternativeName Access_Control_Architecture
Access_Control_Component
Access_Control_List
Access_Control_Model
Access_control_list
Access_control_model
access_control_model
access_control_system
authentication_system
gptkbp:appliesTo gptkb:Data
Networks
Processes
Applications
Users
Devices
gptkbp:auditedBy Compliance Officer
gptkbp:canBe gptkb:RFID_Technology
gptkb:Smart_Cards
hybrid
Physical
Logical
Biometric Data
Mobile Credentials
PIN Codes
gptkbp:canBeManagedBy Security Administrator
gptkbp:component gptkb:security
gptkb:mandatory_access_control
Access Control System
Access Logs
Authentication Mechanism
Authorization Mechanism
Biometric Scanners
Card Readers
Electronic Locks
Keypads
Physical Barriers
Software Interface
discretionary access control
gptkbp:contrastsWith capability-based security
gptkbp:controlledBy execute access
read access
write access
delete access
gptkbp:controls Entry Points
Exit Points
gptkbp:defines How Permissions Are Granted
gptkbp:enables data protection
risk management
compliance
gptkbp:enforcedBy Access Policies
gptkbp:example gptkb:Role-Based_Access_Control
gptkb:mandatory_access_control
gptkb:UNIX_file_permissions
gptkb:Windows_NTFS_permissions
role-based access control
attribute-based access control
Attribute-Based Access Control
Discretionary Access Control
Mandatory Access Control
discretionary access control
Cisco router ACLs
gptkbp:foundIn operating systems
enterprise applications
cloud platforms
gptkbp:function manage user permissions
enforce access policies
gptkbp:goal prevent unauthorized access
protect resources
enforce policies
gptkbp:guarantees integrity
availability
confidentiality
gptkbp:implementedIn gptkb:mandatory_access_control
role-based access control
attribute-based access control
discretionary access control
access control models
gptkbp:improves Security
Safety
gptkbp:includes gptkb:government_agency
gptkb:audit
authentication
accountability
gptkbp:integratesWith Building Management System
Fire Alarm System
Video Surveillance System
gptkbp:monitors User Activity
gptkbp:prevention Unauthorized Access
gptkbp:purpose Restrict Access to Resources
define permissions
restrict access
gptkbp:recordedAt Access Events
gptkbp:relatedConcept identity and access management
least privilege
separation of duties
defense in depth
zero trust architecture
gptkbp:relatedStandard gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-162
gptkb:ISO/IEC_27002
gptkbp:relatedTo gptkb:government_agency
gptkb:security
gptkb:audit
Authorization
authentication
information security
Security
access control
role-based access control
Authentication
Alarm System
Identity Management
Surveillance System
Policy Enforcement
access control entry
gptkbp:requires System Configuration
User Credentials
Access Rights
gptkbp:specifies what operations are allowed
which users or system processes are granted access
gptkbp:standardizedBy gptkb:NIST
gptkb:ISO/IEC_27001
gptkbp:subject Regulatory Compliance
Security Policies
gptkbp:supports Multi-factor Authentication
Role-based Access Control
Time-based Access Control
gptkbp:usedFor Regulating entry and exit
gptkbp:usedIn gptkb:Data_Centers
gptkb:Information_Security
network security
operating systems
file systems
cloud security
network devices
security systems
Offices
application security
enterprise security
Buildings
gptkbp:bfsParent gptkb:Access_Control
gptkb:Django
gptkb:ACS
gptkbp:bfsLayer 5