Logical Access Control: The mechanisms used to manage access rights to resources on a computer system or network, often based on user identity or role. These mechanisms determine who or what can view or use resources in a computing environment. Examples of logical access control methods include user authentication processes, access control lists (ACLs), and role-based access control (RBAC).
Categories: CC D3: Access Controls Concepts | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D5: Identity and Access Management (IAM) | Security+ D1: General Security Concepts | SSCP D2: Access Controls
« Back to Glossary Index