· 4 min read
What is Access Control | Definition and Meaning
Access control mechanisms are essential in database management systems (DBMS) for protecting sensitive information. This article explains Mandatory Access Control (MAC) and Discretionary Access Control (DAC), their differences, and implications in DBMS.

Access control mechanisms are crucial components of database management systems (DBMS), ensuring that sensitive information is protected from unauthorized access. Among the various models employed, Mandatory Access Control (MAC) and Discretionary Access Control (DAC) hold significant prominence. This article aims to clarify what these terms mean, how they differ, and their implications in a DBMS context.
What is Mandatory Access Control (MAC)?
Mandatory Access Control (MAC) is a security model that enforces access restrictions based on predetermined security policies. Unlike Discretionary Access Control (DAC), where users can control access permissions, MAC strictly regulates who can access what data based on the security clearance, effectively removing the discretion of individual users in data management.
Characteristics of MAC
Centralized Control: In MAC environments, access rights are determined at a system level by an administrator, not by individual users. This central governance helps maintain a stringent security posture.
Security Levels: Data and users are assigned security clearance levels, such as confidential, secret, and top secret. This classification aids in establishing strict access controls based on the principle of least privilege.
Policy-driven Access: Access decisions are made based on a set of predefined policies that consider user roles and data sensitivity rather than the user�s preferences.
Example of Mandatory Access Control
A classic example of MAC is found in military institutions where access to files and information is granted based on the user’s security clearance. For instance, a data file classified as “Top Secret” can only be accessed by individuals with “Top Secret” clearance, thereby preventing unauthorized disclosure.
How Does Mandatory Access Control Work?
In practical terms, MAC operates on the foundation of labeling and categorization. Data objects and users are assigned security labels, while the access control policies dictate the interactions permissible between these entities.
What Is MAC Based On?
The implementation of MAC is rooted in compliance with regulatory standards and frameworks that dictate how sensitive information must be handled. This includes best practices defined by various agencies, such as NIST and the Common Criteria, which advocate the use of MAC for systems handling sensitive government or personal data.
Exploring Discretionary Access Control (DAC)
Contrasting MAC is Discretionary Access Control (DAC), a model that allows users the authority to control access to their own resources. In DAC, resources such as files and folders come with inherent permissions that the owner manages.
Disadvantages of Discretionary Access Control
User Error: Since permissions can be modified by users, the risks of unintended exposure and security breaches increase.
Complexity in Management: As user privileges proliferate, managing permissions can become a cumbersome task, potentially leading to inefficiencies and vulnerabilities.
No Centralized Oversight: With DAC, there is no overarching control over how access permissions are set, making it challenging to maintain a cohesive security strategy across resources.
MAC vs DAC: The Key Differences
The primary differences between MAC and DAC revolve around the distribution of control and permission management:
- Control: MAC enforces centralized control while DAC allows users to exercise discretion over their resources.
- Access Determination: In MAC, access is determined by system policies (e.g., security levels), whereas, in DAC, access is determined by the users who own the resources.
Role-Based Access Control (RBAC): A Hybrid Approach
An emerging model is Role-Based Access Control (RBAC), which seeks to combine effective elements of both MAC and DAC. RBAC functions by assigning access permissions based on user roles within an organization. This hybrid approach enhances security while still allowing for some level of user discretion.
Rationale for RBAC
RBAC provides a balanced framework that mitigates the downsides associated with both MAC and DAC. By centralizing role management while allowing users to operate within that framework, organizations can enhance security without compromising operational flexibility.
Mandatory Access Control (MAC) and Discretionary Access Control (DAC) are fundamental to the security landscape of database management systems. While MAC provides a robust security framework through centralized control and management based on security policies, DAC offers flexibility but introduces certain risks and complexities. Deciding between these models often depends on an organization�s specific requirements, risk tolerance, and regulatory obligations. Additionally, understanding known vulnerabilities is crucial for organizations to fortify their access control measures. Through informed decision-making and robust policy enforcement, organizations can safeguard their sensitive information effectively while navigating the multifaceted landscape of access control. It’s essential for organizations to stay informed about these vulnerabilities and proactively apply necessary updates and protections to their systems.