Control AccessControl

URI: AccessControl

Package: Network

< prev | next >

Description: The asset (device or service) has an enforcement point (PEP) preventing unauthorised access. Normally used in conjunction with an authentication mechanism.

Host

A device that can store, process, transmit or receive data.

Process

Represents a process (usually implemented by software running on a Host) that can read, update or create data, or exchange data with other processes.

CSG-DataAccessControl

The host device Host enforces an access control policy for a stored copy of Data.

CSG-DataBaseAccessControl

The data service Service enforces an access control policy for a stored copy of Data.

CSG-BiometricAccessControlAtHost

Access to device Host is controlled, by authenticating authorised users using biometrics.

CSG-BiometricIDCheckedAtHost

Users in the role Human have a biometric ID such as a fingerprint registered with the system, enabling them to pass a biometric ID check to access host Host.

CSG-ChipAndPinAccessControlAtHost

Access to device Host is controlled, by authenticating authorised users using a 2-factor system involving possession of a physical key or dongle, such as a chip and PIN card.

CSG-ClientContinuousAuthentication

Access to service Service is controlled by authenticating user Human based on their registered usage characteristics captured by the device CHost.

CSG-ClientContinuousAuthentication-Trigger

Access to service Service is controlled by authenticating user Human based on their registered usage characteristics captured by the device CHost.

CSG-ClientOneTimeKeyAuthentication

Access to service Service is controlled, by authenticating authorised users using a one time key created using a client-side authentication device provided to them.

CSG-ClientOutOfBandKeyAuthentication

Access to service Service is controlled, by authenticating authorised users using a password and a separate key sent to them via a separate (out of band) means.

CSG-ClientPasswordAuthentication

The service Service controls access by requiring users to authenticate with a password.

CSG-ClientX509Authentication

Access to service Service is controlled, by authenticating authorised users during the TLS connection against a known public key registered via a trustworthy means such as X509.

CSG-ContinuousUserAuthentication

Access to process Process is controlled by authenticating user Human based on their registered usage characteristics captured by a personal device Host.

CSG-PasswordChecksAtHost

Access to device Host is controlled, by authenticating authorised users using a password.

CSG-UserPasswordAccessToHost

Users in the role Human choose a password which is registered with the system allowing access to interactive host Host that authenticates using the password.