Access Control Models: An Overview of the Four Main Types

Поділитися
Вставка
  • Опубліковано 4 січ 2025

КОМЕНТАРІ • 22

  • @gueric21
    @gueric21 Рік тому +4

    Explained so clearly. I could not understand the differences no matter how many times I tried. Thank you for this video.

  • @Buuhuuda
    @Buuhuuda 5 місяців тому +1

    This is by far the best explanation video on this topic. Thanks you!

  • @salaheddinelaghbeche
    @salaheddinelaghbeche Місяць тому +1

    I came across this video on Access Control Models, and it surprised me. The perspective offered is both enlightening and captivating. If you're passionate about Access Control Models, you should check this out-there are some real gems here that might change your viewpoint.

  • @LloydmunyaradziMakoni
    @LloydmunyaradziMakoni 10 місяців тому

    Wonderful explanation

  • @jalalalzamili4486
    @jalalalzamili4486 9 місяців тому

    well done. very clear explanation .

  • @LeylaMammadova-e1k
    @LeylaMammadova-e1k 4 місяці тому

    Hello. Thank you for this video. Can you show us the practical aspects of these access control systems?

    • @GetSafeAndSound
      @GetSafeAndSound  2 місяці тому

      You can have more information in this page: getsafeandsound.com/blog/commercial-access-control-systems/

  • @daviddawid123
    @daviddawid123 Рік тому

    Nice video, gave me a lot more content. Can you please explain how you can control access and what staff members can see in for example a cloud saas for health and safety whereby the organisation structure has been replicated in the saas solution to control access and permissions. The org structure level has been loaded in at level 3, am struggling to get my head around it

    • @GetSafeAndSound
      @GetSafeAndSound  Рік тому +1

      I'm glad you found the video helpful! Access control in cloud-based Software as a Service (SaaS) solutions can get complex, especially when reflecting the structure of an organization. In most systems, you can set up role-based access control (RBAC), which allows you to assign permissions based on roles within the organization. For example, in a health and safety SaaS solution, you might have roles like 'administrator', 'manager', 'staff', etc. Each of these roles would have different permissions.
      If your organization's structure is loaded at 'level 3', it suggests that there might be different tiers or levels of access control. Each level could correspond to different roles or departments within your organization, and those at higher levels would typically have more permissions or access than those at lower levels.
      However, the specifics can vary greatly depending on the particular SaaS solution you're using. Therefore, for a more detailed and tailored explanation, it might be best to reach out to the vendor's customer support or check their user manual or online documentation. They should be able to guide you on how to best set up the access control to mirror your organization's structure.
      I hope this gives you a starting point. Please let us know if you have more questions!

  • @Shouko91
    @Shouko91 6 місяців тому

    Thank you!

  • @emmamcterrelly6936
    @emmamcterrelly6936 8 місяців тому

    Could you not combine rbac with rules, allowing exceptions under special circumstances (covered by the rules defined for that role)

    • @GetSafeAndSound
      @GetSafeAndSound  5 місяців тому

      Yes, you can combine RBAC with rule-based access to allow for exceptions under special circumstances. This hybrid approach can provide the flexibility needed for specific scenarios while still maintaining a structured access control system.

  • @MauryaVictorien
    @MauryaVictorien 11 місяців тому

    Thank you

  • @Israelxox
    @Israelxox Рік тому

    This are logical/technical access controls only!

    • @GetSafeAndSound
      @GetSafeAndSound  Рік тому

      Thank you for your comment. You're correct that the access control models discussed in the video are designed for physical access control systems. These models play a crucial role in regulating who can access certain areas at specific times, enhancing the overall security of a facility.
      If you're interested in the topic of logical or technical access control, that is a different subject related to information technology security, and while equally important, it is not the focus of our video or our general content. Our focus is on physical security and access control solutions. However, it's important to note that the principles we discussed can also be applied to access control in information technology. We appreciate your interest and your comment.