3.5. Compare and implement logical access control methods.

In addition to the foundational access control methodologies of MAC, DAC, and RBAC, other logical methods of access or privilege management can be applied. These include applications specific to an access control model as well as those completely independent of such models.

3.5.1. ACL

An access control list (ACL) is a collection of usernames and group names with specific permission allow/deny assignments embedded onto a resource object. An ACL contains individual access control entries (ACEs) that each focus on a single user or group.

3.5.2. Group policies

A group policy is a tool of Windows environments (typically Microsoft Active Directory networks) that allows centralized control ...

Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.