Control AccessControl
URI: AccessControl
Package: Network
Description: The asset (device or service) has an enforcement point (PEP) preventing unauthorised access. Normally used in conjunction with an authentication mechanism.
The host device Host enforces an access control policy for a stored copy of Data. |
|
The data service Service enforces an access control policy for a stored copy of Data. |
|
Access to device Host is controlled, by authenticating authorised users using biometrics. |
|
Users in the role Human have a biometric ID such as a fingerprint registered with the system, enabling them to pass a biometric ID check to access host Host. |
|
Access to device Host is controlled, by authenticating authorised users using a 2-factor system involving possession of a physical key or dongle, such as a chip and PIN card. |
|
Access to service Service is controlled by authenticating user Human based on their registered usage characteristics captured by the device CHost. |
|
Access to service Service is controlled by authenticating user Human based on their registered usage characteristics captured by the device CHost. |
|
Access to service Service is controlled, by authenticating authorised users using a one time key created using a client-side authentication device provided to them. |
|
Access to service Service is controlled, by authenticating authorised users using a password and a separate key sent to them via a separate (out of band) means. |
|
The service Service controls access by requiring users to authenticate with a password. |
|
Access to service Service is controlled, by authenticating authorised users during the TLS connection against a known public key registered via a trustworthy means such as X509. |
|
Access to process Process is controlled by authenticating user Human based on their registered usage characteristics captured by a personal device Host. |
|
Access to device Host is controlled, by authenticating authorised users using a password. |
|
Users in the role Human choose a password which is registered with the system allowing access to interactive host Host that authenticates using the password. |