Authorization Models: RBAC, ABAC, MAC, DAC, and Least Privilege

Key Takeaways

  • Authorization decides what an authenticated subject can access; it is separate from login success.
  • RBAC assigns permissions through roles, while ABAC uses attributes such as department, device, time, and data label.
  • MAC is centrally enforced with labels and clearances; DAC lets owners grant access.
  • Least privilege, need-to-know, separation of duties, and just-in-time access reduce blast radius.
  • Permission creep is a common scenario clue after transfers, projects, and emergency access.
Last updated: April 2026

Authorization Models and Least Privilege

Authentication says the user is who they claim to be. Authorization says what that user can do. A user can authenticate correctly and still be blocked because the requested action is outside policy.

ModelHow access is decidedBest clue
RBACPermissions come from job roles or groupsAnalyst role, payroll role, admin role
ABACPolicy evaluates attributesUser department, data label, device health, location, time
MACCentral authority enforces labels and clearancesSecret data, clearance level, mandatory label
DACResource owner grants permissionsFile owner shares a folder
Rule-based accessAccess follows explicit rulesFirewall ACL, time-of-day rule

Least Privilege Family

PrincipleMeaningScenario clue
Least privilegeGrant only the access requiredRead-only access for reporting
Need-to-knowAccess only when the business need existsInvestigator can view only assigned cases
Separation of dutiesSplit sensitive tasks across peopleOne person requests payment, another approves
Just-in-time accessGrant elevated rights brieflyAdmin access expires after change window
Privileged access managementControl and monitor powerful accountsCheckout, approval, vaulting, session recording

Choosing the Model

RBAC is efficient when access maps cleanly to jobs. ABAC is more flexible when decisions depend on context. MAC is strict and centrally controlled, often associated with sensitivity labels. DAC is flexible but can become messy because owners can share access.

ScenarioBest fitReason
All help desk users need the same ticket permissionsRBACRole maps to job function
Payroll files allow access only from managed devices during business hoursABACMultiple attributes drive the decision
Classified file requires a clearance label matchMACCentral labels and clearances control access
Project owner grants read access to a shared documentDACOwner decides who can access

Trap Callout: Admin Convenience Is Not Least Privilege

If a user needs to restart one service, local administrator access to the whole server is excessive. Prefer a narrowly scoped permission, delegated admin task, service management role, or just-in-time privileged session.

Scenario Walkthrough

A developer is temporarily assigned to investigate a production issue. The weak answer is to add the developer permanently to the production admin group. A stronger answer is time-limited access through privileged access management, approval, MFA, session logging, and automatic removal after the work is complete.

Quick Drill

ClueAnswer
Access follows the job titleRBAC
Access depends on user role, data classification, device posture, and timeABAC
Data owner shares access with a coworkerDAC
Labels and clearances decide accessMAC
Old access remains after transferPermission creep
Test Your Knowledge

A policy allows finance employees to access payroll only from managed laptops, only during business hours, and only when the data is labeled internal. Which model is most directly represented?

A
B
C
D
Test Your Knowledge

A file owner grants another user read access to a folder. Which authorization model is this?

A
B
C
D
Test Your Knowledge

A system administrator needs elevated access for a two-hour maintenance window. Which option best supports least privilege?

A
B
C
D