Skip to main content

Access Control

Also known as: RBAC, Role-Based Access Control, Logical Access Control

Policies and mechanisms that restrict who can do what within information systems, by reference to identity, role, or attribute, recorded in a form that can be reviewed.

Written by Askara Solutions editorial team · Updated

Access control is where the security programme proves itself in practice. The policy on paper might require least privilege and separation of duties, but the moment that matters is when a real employee, contractor, or system tries to do a real thing and the platform either allows it or refuses it. Almost every Annex A control in the access family is a question about the gap between those two statements.

Role-Based Access Control is the dominant pattern in European mid-market companies, because it lets administrators reason about access in terms of business roles rather than per-user permissions. The discipline depends on the role catalogue itself: too few roles and the system collapses into administrator-or-end-user; too many roles and the catalogue becomes a maintenance burden in its own right. Attribute-Based Access Control adds context to the decision (time of day, network location, sensitivity of the resource), which is increasingly relevant as the workforce becomes distributed and the perimeter dissolves.

Whatever model is chosen, three operational rhythms separate working access control from documented access control. Joiner, mover, and leaver events change access promptly rather than at the next audit. Access reviews run on a published cadence and are approved by named individuals, not rubber-stamped by a manager who inherited a spreadsheet. And privileged access, in particular, is subject to a tighter loop: time-limited, recorded, and challenged. The Askara Solutions agent maintains the linkage between the access catalogue, the role definitions, and the risk register, so the controls people show the auditor are the controls that are actually operating.

Related terms

  • Identity and Access Management

    The discipline of authenticating who someone is, deciding what they are allowed to do, and recording the decisions so they can be reviewed, revoked, or attested to over time.

  • Least Privilege

    Principle that every identity should hold only the permissions required for its legitimate function, with privileges granted, time-bound, and revoked rather than accumulated.

  • Annex A

    The catalogue of 93 information security controls in ISO/IEC 27001:2022, organised into four themes (organisational, people, physical, technological), referenced from the Statement of Applicability.

  • Information Security Management System

    The documented set of policies, procedures, and accountability that an organisation uses to manage information-security risk over time.

Authoritative sources

Where to read more.