From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Access control lists

Access control lists

From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Start my 1-month free trial

Access control lists

- In a Discretionary Access Control system resource owners have the ability to set and modify permissions for other users of the system. File owners manage file system permissions by the creation of access control lists. An access control list is simply a table containing usernames and the permissions granted to each user on a resource. For example, I might own a file on a computer governed by a Discretionary Access Control system and decide that I want other users to access my file. I might grant one user the ability to edit the file and a large group of users the ability to read that file. Each of those decisions would require an entry on an access control list. The NTFS file system used by windows implements access control lists and allows users to assign a variety of permissions. Full control is just what the name implies. The user can perform any action on the file or folder. Read permission allows the user to…

Contents