Statements (150)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
gptkb:software Security System computer security concept Security Model |
gptkbp:abbreviation |
gptkb:ACL
|
gptkbp:alternativeName |
Access_Control_Architecture
Access_Control_Component Access_Control_List Access_Control_Model Access_control_list Access_control_model access_control_model access_control_system authentication_system |
gptkbp:appliesTo |
gptkb:Data
Networks Processes Applications Users Devices |
gptkbp:auditedBy |
Compliance Officer
|
gptkbp:canBe |
gptkb:RFID_Technology
gptkb:Smart_Cards hybrid Physical Logical Biometric Data Mobile Credentials PIN Codes |
gptkbp:canBeManagedBy |
Security Administrator
|
gptkbp:component |
gptkb:security
gptkb:mandatory_access_control Access Control System Access Logs Authentication Mechanism Authorization Mechanism Biometric Scanners Card Readers Electronic Locks Keypads Physical Barriers Software Interface discretionary access control |
gptkbp:contrastsWith |
capability-based security
|
gptkbp:controlledBy |
execute access
read access write access delete access |
gptkbp:controls |
Entry Points
Exit Points |
gptkbp:defines |
How Permissions Are Granted
|
gptkbp:enables |
data protection
risk management compliance |
gptkbp:enforcedBy |
Access Policies
|
gptkbp:example |
gptkb:Role-Based_Access_Control
gptkb:mandatory_access_control gptkb:UNIX_file_permissions gptkb:Windows_NTFS_permissions role-based access control attribute-based access control Attribute-Based Access Control Discretionary Access Control Mandatory Access Control discretionary access control Cisco router ACLs |
gptkbp:foundIn |
operating systems
enterprise applications cloud platforms |
gptkbp:function |
manage user permissions
enforce access policies |
gptkbp:goal |
prevent unauthorized access
protect resources enforce policies |
gptkbp:guarantees |
integrity
availability confidentiality |
gptkbp:implementedIn |
gptkb:mandatory_access_control
role-based access control attribute-based access control discretionary access control access control models |
gptkbp:improves |
Security
Safety |
gptkbp:includes |
gptkb:government_agency
gptkb:audit authentication accountability |
gptkbp:integratesWith |
Building Management System
Fire Alarm System Video Surveillance System |
gptkbp:monitors |
User Activity
|
gptkbp:prevention |
Unauthorized Access
|
gptkbp:purpose |
Restrict Access to Resources
define permissions restrict access |
gptkbp:recordedAt |
Access Events
|
gptkbp:relatedConcept |
identity and access management
least privilege separation of duties defense in depth zero trust architecture |
gptkbp:relatedStandard |
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-162 gptkb:ISO/IEC_27002 |
gptkbp:relatedTo |
gptkb:government_agency
gptkb:security gptkb:audit Authorization authentication information security Security access control role-based access control Authentication Alarm System Identity Management Surveillance System Policy Enforcement access control entry |
gptkbp:requires |
System Configuration
User Credentials Access Rights |
gptkbp:specifies |
what operations are allowed
which users or system processes are granted access |
gptkbp:standardizedBy |
gptkb:NIST
gptkb:ISO/IEC_27001 |
gptkbp:subject |
Regulatory Compliance
Security Policies |
gptkbp:supports |
Multi-factor Authentication
Role-based Access Control Time-based Access Control |
gptkbp:usedFor |
Regulating entry and exit
|
gptkbp:usedIn |
gptkb:Data_Centers
gptkb:Information_Security network security operating systems file systems cloud security network devices security systems Offices application security enterprise security Buildings |
gptkbp:bfsParent |
gptkb:Access_Control
gptkb:Django gptkb:ACS |
gptkbp:bfsLayer |
5
|