Access Control
Access control is a security process that determines who is allowed to access specific data, resources, or systems within an organization. It works by granting or denying requests based on established rules, ensuring that only authorized users can view or interact with protected information. Access control is considered a fundamental component of data security.
Access control is the process of granting or denying specific requests by users, groups, or machines to obtain and use information, access information processing services, or enter specific physical or logical areas. It encompasses the policies, mechanisms, and enforcement points (such as authentication, authorization, and auditing) that collectively govern whether a subject should be permitted or denied access to a given object. In application security, access control is typically enforced through models such as role-based access control (RBAC), attribute-based access control (ABAC), or discretionary/mandatory schemes, and must be validated both at the code level (e.g., authorization checks in application logic) and at runtime (e.g., session context, dynamic policy evaluation), since static analysis alone cannot fully verify correct enforcement across all execution paths.
Why it matters
Access control is a fundamental component of data security, serving as the primary mechanism that dictates who can access and use an organization's information and resources. When access control is improperly implemented, attackers can escalate privileges, access sensitive data belonging to other users, or perform unauthorized actions. Broken access control has consistently ranked among the most critical and prevalent categories of application security vulnerabilities, reflecting how frequently development teams fail to enforce authorization checks correctly across all application endpoints and resources.
The challenge with access control is that it must be validated both at the code level (for example, ensuring authorization checks exist in application logic) and at runtime (for example, evaluating session context and dynamic policy decisions). Static analysis alone typically cannot fully verify correct enforcement across all execution paths, which means that gaps in access control often go undetected until they are exploited. This makes access control a persistent and high-impact area of risk for any organization that develops or operates software systems.
Who it's relevant to
Inside AC
Common questions
Answers to the questions practitioners most commonly ask about AC.