Strong access control is vital for protecting sensitive data and blocking cyberattacks on your organization. However, choosing the right access management model isnโt that simple. This post breaks down mandatory access control (MAC) and discretionary access control (DAC), providing you with insights on how to use each of them and how they differ. Youโll also get actionable tips on how to implement each approach and how the Syteca platform can help you.
Key takeaways:
- The choice between mandatory access control (MAC) and discretionary access control (DAC) depends on your organization’s priorities.
- MAC is mostly used by government organizations, militaries, and law enforcement, while DAC is a good choice for small businesses with limited IT staff and cybersecurity budgets.
- The best strategy is to choose a hybrid model, using strict MAC for sensitive data and DAC flexibility for collaboration.
- Syteca PAM allows you to secure privileged access with just-in-time access provisioning, strong authentication, password management, and account discovery.
Access control models: why are they important?
Access control regulates which users, applications, and devices can view, edit, add, and delete resources in an organizationโs environment. Controlling access is one of the key practices for protecting sensitive data from theft, misuse, abuse, and other threats. There are two levels of access control: physical and logical.
Access control helps mitigate both internal and external threats. Thatโs why IT regulations, laws, and standards โ NIST, HIPAA, PCI DSS, and others โ enforce strict physical and logical access control measures. In this article, we discuss models of logical access control.
You can choose from several logical access control models, including mandatory, discretionary, role-based, and attribute-based. Each model has its pros and cons. Later in this article, weโll review the pros and cons of MAC and DAC. For more on this topic, read our article about the pros and cons of role-based access control and attribute-based access control models.
The process of selecting one of these models differs from organization to organization. The choice of model depends on:
- The nature of the protected data
- IT requirements and industry standards
- The number of employees
- The cybersecurity budget
Letโs learn the specifics of each model to find out when using MAC is better than using DAC and vice versa.
Insider Threat Management with Syteca
What is mandatory access control?
Mandatory access control (MAC) is a model of access control where the operating system provides users with access based on data confidentiality and user clearance levels. In this model, access is granted on a need-to-know basis: users must prove their need for information before gaining access.
MAC is also called a non-discretionary access control model, which means that control isnโt granted at the discretion of the user or file owner. The control mechanisms of the MAC model enable organizations to implement zero-trust principles.
MAC is considered one of the most secure access control models. Access rules in this model are manually defined by system administrators and strictly enforced by the operating system or security kernel. Regular users canโt alter security attributes even for data theyโve created.
What are the basic principles of MAC?
- The utmost privacy and confidentiality of the organizationโs resources are paramount. No one has default privileges to access or edit someoneโs data.
- Access provisioning is centrally administered.
- Each individual and resource in the system has security labels with their classification and category.
With MAC, the process of gaining access looks like this:
- The administrator configures access policies and defines security attributes: confidentiality levels and clearances for accessing different projects and types of resources.
- The administrator assigns a set of attributes to each subject (user or resource that accesses data) and object (file, database, port, etc.).
- When a subject attempts to access an object, the operating system examines the subjectโs security attributes and decides whether access can be granted.
- To obtain access to the object, the user provides their credentials.
In addition to checking confidentiality and clearance levels (classification matches between subject and object), operating systems pay attention to category matches between subject and object. A โtop secretโ classification doesnโt automatically provide a user full access to a file if they arenโt a member of the required category for the object.
Letโs take a look at an example of mandatory access control implementation. Assume that an organization possesses data with a โtop secretโ confidentiality level and an โengineering projectโ security label. This data is available only to a set of users with both a โtop secretโ security clearance (classification) and authorization to access engineering documents (category). Such users can also access information that requires a lower level of clearance. At the same time, employees with lower clearance levels or no rights to access engineering documents canโt access such information.
MAC brings many benefits to a cybersecurity system, but it also has several disadvantages. Letโs look at the advantages and disadvantages of mandatory access control.
Pros and cons of MAC
- High level of data protection โ An administrator defines access to objects, and users canโt alter that access.
- Granularity โ An administrator sets user access rights and object access parameters manually.
- Immunity to Trojan Horse attacks โ Users canโt declassify data or share access to classified data.
- Fewer errors โ Strict and constantly controlled policies help reduce system errors that lead to over-privileged users.
- Strict division โ Admins divide users into subsets and limit resource exposure for these subsets using security attributes.
- Complex maintenance โ Manual configuration of security levels and clearances requires constant attention from administrators.
- Manual scalability โ MAC doesnโt scale automatically. New users and pieces of data demand constant updates on objects and account configurations.
- Interference with workflow โ Users have to request access to each new piece of data; they canโt configure access parameters for their own data.
When to use MAC
This access control model is mostly used by government organizations, militaries, and law enforcement institutions. The US government uses MAC to secure classified information and to support multilevel security policies and applications. For better data protection and compliance in the insurance industry and the banking sphere, organizations use MAC to control access to customer account data. This type of non-discretionary access control model can also protect access to databases, where procedures, tables, views, and other elements are the objects.
Itโs reasonable to use MAC in organizations that value data security more than operational flexibility and costs. Implementing MAC in a private organization is rare because of its complexity and inflexibility.
A purely MAC model provides a high and granular level of security. On the other hand, itโs difficult to set up and maintain. Thatโs why itโs common to combine MAC with other access control models.
For example, combining it with a role-based model speeds up the configuration of user profiles. Instead of defining access rights for each user, an administrator can create user roles. Each organization has users with similar roles and access rights: employees with the same job position, third-party vendors, etc. An administrator can configure roles for these groups instead of configuring individual user profiles from scratch.
Another popular combination is MAC and the discretionary access control model, or DAC. MAC can secure sensitive data, while DAC allows coworkers to share information within a corporate file system.
Request access to the online demo of Syteca!
See how Syteca can help you manage user access to your organization’s systems and data.
What is discretionary access control?
Discretionary access control is an identity-based access control model that gives users some control over their data. Data owners (document creators or any users authorized to control data) can define access permissions for specific users or groups of users. In other words, whom to give access to and what privileges to grant are decided at the resource ownerโs discretion.
Access permissions for each piece of data are stored in an access-control list (ACL). An administrator creates this list when a user grants access to somebody. The list can be generated automatically. An ACL includes users and groups that may access data and their access levels. A system administrator can also enforce an ACL. In this case, the ACL acts as a security policy, and regular users canโt edit or overrule it.
What are the basic principles of DAC?
- Object characteristics (size, name, directory path) are invisible to users that arenโt authorized.
- Several failed access attempts trigger additional authentication (MFA) requirements or deny access.
- Users can transfer object ownership to other users. The owner also determines the access type of other users. Based on these access privileges, the operating system decides whether to grant access to a file.
Gaining access to a file with DAC works like this:
- User 1 creates a file and becomes its owner, or obtains access rights to an existing file.
- User 2 requests access to this file. They provide their credentials: username, password, or something else.
- User 1 grants access at their discretion. However, user 1 canโt grant access rights that exceed their own. For example, if user 1 can only read a document, they canโt allow user 2 to edit it.
- If thereโs no contradiction between the administrator-created ACL and the decision made by user 1, access is granted.
Discretionary access control is quite a popular model because it allows a lot of freedom for users and doesnโt increase administrative overhead. However, it has several considerable limitations.
Pros and cons of DAC
- User-friendly โ Users can manage their data and quickly access the data of other users.
- Flexible โ Users can configure data access parameters without administrators.
- Easy to maintain โ Adding new objects and users doesnโt take much time for the administrator.
- Granular โ Users can configure access parameters for each piece of data.
- Low level of data protection โ DAC canโt ensure reliable security because users can share their data however they like.
- Obscure access management โ Thereโs no centralized access management, so in order to find out access parameters, you have to check each ACL.
- Overlay of user privileges โ A permissions conflict may occur for users of multiple nested workgroups.
When to use DAC
DAC shouldnโt be used by organizations that work with extremely sensitive data (medical, financial, military, etc.) for several reasons:
- If user 1 shares access rights with user 2, thereโs no guarantee that user 2 needs this access to work, wonโt steal or corrupt data, and wonโt grant access to a malicious user.
- Itโs impossible to control information flows inside the network.
- Itโs impossible to enforce the principles of least privilege, need to know, and separation of duties.
At the same time, DAC is a good choice for small businesses with limited IT staff and cybersecurity budgets. It allows for the sharing of information and ensures the smooth operation of the business. When applied in an organization with 10 to 20 employees, DAC presents less complexity and oversight challenges compared to using it in organizations with hundreds or thousands of employees.
Explore the power of Syteca now!
Test how Syteca can help you secure access to critical systems and data.
MAC vs. DAC: Comparison table
Below, we review the key characteristics of both models to help you easily grasp the differences between DAC and MAC.
DAC and MAC differences
MAC
Administrators and operating system
DAC
Administrators and users
MAC
Confidentiality levels and clearances
DAC
Access-control lists with user identities
MAC
DAC
MAC
DAC
MAC
DAC
MAC
High (admins adjust clearances for each user and object manually)
DAC
High (users can assign access rights to any other user or group)
MAC
DAC
MAC
Government, military, law enforcement
DAC
Small and medium-sized companies
MAC
Tasks and objects that have their own IDs
DAC
Ownership and user IDs
DAC and MAC differences
Comparing DAC vs. MAC access control models in this way demonstrates that theyโre different in almost every aspect and suitable for different kinds of organizations. DAC works well for organizations that require flexibility and user-friendly workflows. On the other hand, MAC is more suitable for organizations that work with highly sensitive data.
Privileged Access Management with Syteca
Implement robust and flexible access management with Syteca
Many organizations require elements of both discretionary access control and mandatory access control models. The flexibility, scalability, and simplicity of DAC are important for creating a simple and uninterrupted workflow. At the same time, organizations might need the high level of security and granularity offered by the MAC model.
Are these characteristics crucial for your organization? Sytecaโs access management functionality can help you get the best of MAC and DAC with an all-in-one platform. We offer a wide range of access control possibilities:
- Identity management โ Automate and secure user authentication to reduce the risks of unauthorized or malicious access.
- Two-factor authentication โ Confirm user identities by prompting users to enter additional one-time passcodes sent to their mobile devices.
- Secondary authentication โ Request users to enter additional credentials after logging in to distinguish their activity in critical administrative and other shared accounts.
- Password management โ Advance your secrets management strategy by automating password provisioning and rotation, and enabling employees to create and share their own passwords.
- Privileged access management โ ะกontrol user privileges and monitor privileged user sessions to ensure users handle your organizationโs most sensitive data securely.
- Access request and approval workflows โ Enable your admins to approve user requests for access to protect your most critical resources properly.
Conclusion
After comparing DAC and MAC, we can clearly see that they fall on opposite ends of the access control spectrum. MAC is controlled by administrators and requires lots of time and effort to maintain, but it provides a high level of security. DAC is much easier to implement and maintain, as users can manage access to the data they own. However, DAC doesnโt measure up when it comes to protecting sensitive records.
Syteca allows you to combine the benefits of both of these access control models. The platformโs password management, one-time passwords, time-based user access restrictions, and manual access approval functionalities can help you enforce a flexible yet secure access management process.
Want to try Syteca? Request access
to the online demo!
See why clients from 70+ countries already use Syteca.