Also same info at: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-162.pdf Guide to Attribute Based Access Control (ABAC) Definition and Considerations
ANSWER: C Attribute-based access control (ABAC)
attribute-based access control (ABAC), attribute based access control - A mechanism of assigning access and privileges to resources through a scheme of attributes or characteristics. The attributes can be related to the user, the object, the system, the application, the network, the service, time of day, or even other subjective environmental concerns. See also discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC, RoBAC, or role-BAC), and rule-based access control (RuBAC, Rule-BAC). OFFICIAL ISC2 STUDY GUIDE GLOSSARY pg 15
Mandatory Access Control A key characteristic of the Mandatory Access Control (MAC) model is the use of labels applied to both subjects and objects. For example, if a user has a label of top secret, the user can be granted access to a top-secret document. In this example, both the subject and the object have matching labels. When documented in a table, the MAC model sometimes resembles a lattice (such as one used for a climbing rosebush), so it is referred to as a lattice-based model.
Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 682). Wiley. Kindle Edition.
C. Attribute-based access control (ABAC)
Attribute-based access control (ABAC) uses attributes associated with subjects, objects, and the environment to make access control decisions. These attributes can include user roles, time of day, location, and other context-specific information. ABAC provides a flexible and dynamic way to define access policies based on various attributes, making it suitable for complex access control scenarios.
C is the answer
ABAC defines access control policies based on assigned attributes of subjects (users/processes) and objects (resources). These attributes, like role, clearance, project, etc. are used to determine access rather than identities alone.
Mandatory AC (MAC) uses labels and clearances.
Role-based AC (RBAC) uses roles.
Discretionary AC (DAC) uses access control lists.
C. Attribute-based access control (ABAC)
Attribute-based access control (ABAC) is an access control mechanism that characterizes subjects (users, processes) and objects (resources) using a set of encoded security-relevant attributes or properties. ABAC allows for fine-grained access control decisions based on various attributes such as user roles, resource classifications, time of access, and other contextual information. This flexibility in defining access policies makes ABAC suitable for complex and dynamic access control scenarios.
The access control mechanism that characterizes subjects and objects using a set of encoded security-relevant properties is known as the Mandatory Access Control (MAC) mechanism.
In this mechanism, every subject and object is assigned a security label, which consists of a set of encoded security properties. These security properties are used to determine whether a subject is allowed to access an object or not.
The security labels are typically defined by a system administrator and are based on a security policy. The security policy specifies the rules and guidelines for access control in the system.
MAC is commonly used in environments that require a high level of security, such as military and government organizations. It is also used in systems that process sensitive or confidential information.
Historically, access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC). These access control models are user-centric and do not take into account additional parameters such as resource information, the relationship between the user (the requesting entity) and the resource, and dynamic information, e.g. time of the day or user IP.
ABAC tries to address this by defining access control based on attributes which describe the requesting entity (the user), the targeted object or resource, the desired action (view, edit, delete), and environmental or contextual information. This is why access control is said to be attribute-based.
https://en.wikipedia.org/wiki/Attribute-based_access_control
It's A, Mandatory access control is a method of limiting access to resources based on the sensitivity of the information that the resource contains and the authorization of the user to access information with that level of sensitivity.
I go with Option A. what are the security relevant properties if I may ask? Are they not they not the Security classifications in MAC? Top Secret, Secret etc...
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
CCNPWILL
5 months, 3 weeks agoGuardianAngel
9 months, 2 weeks agoGuardianAngel
9 months, 2 weeks agoGPrep
10 months, 2 weeks agoYesPlease
11 months, 1 week agoSoleandheel
11 months, 2 weeks agoInclusiveSTEAM
1 year, 1 month agoBoyBastos
1 year, 2 months agoGoseu
1 year, 7 months agojackdryan
1 year, 6 months agoDelab202
1 year, 7 months agojbell
1 year, 7 months ago[Removed]
1 year, 7 months agoSpaceMonkey1
1 year, 7 months agoErnestokoro
1 year, 8 months ago