In a secure web application, users are granted access to features based on their job role. This is an implementation of ____________.

  • Attribute-Based Access Control (ABAC)
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
The described implementation reflects Role-Based Access Control (RBAC), where access permissions are based on users' job roles. RBAC enhances security by ensuring individuals only have access to resources necessary for their roles, minimizing the risk of unauthorized activities. Understanding RBAC is essential for designing access control strategies that align with organizational structures and security policies.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *