Infosec glossary entry

ABAC

ABAC :
Attribute-Based Access Control

Attribute-Based Access Control (ABAC) is a security model that grants or denies access to resources based on the attributes of users, the environment, and the resources themselves. In contrast to traditional access control methods, such as Role-Based Access Control (RBAC), which rely on predefined roles, ABAC allows for more granular access decisions by evaluating dynamic attributes. These attributes can include user characteristics (such as job title, department, or security clearance), environmental conditions (like time of access or location), and resource attributes (for instance, the sensitivity of the data).

The flexibility of ABAC makes it particularly useful in complex environments where access needs may vary significantly. For example, an employee may have access to certain sensitive data only during business hours, or only if they are accessing it from a secure network. This model enhances security by ensuring that access rights can adapt to specific situations and policies, reducing the risk of unauthorized access and improving compliance with regulatory requirements. By implementing ABAC, organizations can better manage who has access to what, based on a wide range of factors rather than relying solely on static roles.


[...] is an authorization model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorized users and actions—those that don’t have “approved” characteristics as defined by an organization’s security policies. https://www.okta.com/blog/2020/09/attribute-based-access-control-abac/

By jean-christoph

April 11, 2023

access control

this might interest you as well

What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles

— And why your SOC might actually need a Bard 🐉⚔️ Cybersecurity teams are often compared to armies, fire brigades, or special forces. Personally? I think they’re much closer to a party of heroes in a classic fantasy role-playing game. No matter how many frameworks, SIEMs, or AI tools we summon, defending a digital kingdom

Read More

Lessons from Sun Tzu’s “The Art of War” in Cybersecurity: Timeless Wisdom or Outdated Tactics?

Introduction Sun Tzu’s "The Art of War" is a legendary strategic treatise written more than 2,500 years ago. Its enduring principles of warfare strategy have transcended military boundaries, influencing disciplines from business management to competitive sports. In today’s digital age, its relevance is increasingly apparent in the cybersecurity landscape, particularly for CISOs of medium-sized enterprises,

Read More

Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity

Why We Keep Losing Despite Stronger Security Controls Over the past three years, businesses have almost doubled their confidence in cybersecurity—rising from 32% in 2021 to 54% in 2024 (The Global Cost of Ransomware Study, 2025). Despite this, ransomware’s impact has only grown: 40% of affected companies suffered significant revenue losses, 58% experienced operational downtime,

Read More