Trust Is designed Not Assumed: CISSP Executive Briefing on Access Controls

Trust Is designed Not Assumed: CISSP Executive Briefing on Access Controls



Access control is not merely a technical enforcement mechanism—it is a business risk control system that determines how trust, authority, and accountability are exercised across an organization. For CISOs and executives, access control failures rarely appear as isolated incidents; they surface as systemic governance breakdowns, audit findings, insider abuse, regulatory penalties, or breach blast-radius amplifiers.

From a CISSP perspective, access control models answer three executive questions:

  1. Who is allowed to do what?
  2. Under which conditions?
  3. With what business risk trade-off?

1. Core Access Control Models (Policy Intent)

Discretionary Access Control (DAC)

DAC is ownership-driven. The resource owner decides access.

  • Strength: Flexibility, ease of collaboration
  • Risk: Privilege sprawl, weak accountability
  • Executive risk: Shadow access and data leakage

DAC is common in file shares and legacy systems and often persists unnoticed, creating long-term exposure.

Mandatory Access Control (MAC)

MAC enforces centralized, label-based access decisions.

  • Strength: Strong confidentiality enforcement
  • Risk: Operational rigidity
  • Executive use case: Defense, intelligence, regulated environments

MAC removes human discretion, making it resilient but costly to operate.

Role-Based Access Control (RBAC)

RBAC assigns permissions based on job roles.

  • Strength: Scalability, auditability
  • Risk: Role explosion if unmanaged
  • Executive value: Compliance alignment

RBAC is foundational but insufficient alone in dynamic, cloud-native enterprises.

Rule-Based Access Control

Access is granted based on system-enforced rules (time, location, network).

  • Strength: Predictable enforcement
  • Risk: Static logic in dynamic threat environments
  • Often paired with MAC

Attribute-Based Access Control (ABAC)

Decisions are based on attributes (user, device, environment, risk).

  • Strength: Granular, Zero Trust–aligned
  • Risk: Policy complexity
  • Executive relevance: Cloud, SaaS, API ecosystems

ABAC enables adaptive trust decisions but demands strong governance.

2. Formal Security Models

Bell–LaPadula (Confidentiality)

  • No Read Up
  • No Write Down
  • Protects data secrecy

Used where data disclosure is the primary concern.

Biba Model (Integrity)

  • No Read Down
  • No Write Up
  • Protects data correctness

Critical for financial systems, OT, and safety systems.

Clark–Wilson Model (Commercial Integrity)

  • Focuses on well-formed transactions and separation of duties
  • Uses:
    • Transformation Procedures (TPs)
    • Integrity Verification Procedures (IVPs)

This is the most business-aligned model, mapping directly to SOX, fraud prevention, and enterprise controls.

Brewer–Nash (Chinese Wall)

  • Prevents conflict of interest
  • Access changes dynamically based on prior access

Used in consulting, legal, financial advisory, where ethical boundaries matter more than classification labels.

3. Additional CISSP-Referenced Models

  • Lattice-Based Models – Formalized access relationships
  • Noninterference Models – Prevent information flow leakage
  • Information Flow Models – Track how data moves across trust boundaries
  • Take-Grant Model – Rights propagation analysis
  • Graham–Denning Model – Secure creation/deletion of subjects and objects

These models help CISOs reason about systemic risk, not implement controls directly.

4. Access Control Maturity Model

Level 1 – Ad Hoc

  • Shared accounts
  • Manual approvals
  • High insider risk

Level 2 – Defined

  • RBAC implemented
  • Periodic reviews
  • Still reactive

Level 3 – Managed

  • Least privilege
  • Separation of duties
  • Central IAM governance

Level 4 – Adaptive

  • ABAC, risk-based decisions
  • Context-aware access
  • Integrated logging

Level 5 – Optimized (Zero Trust)

  • Continuous verification
  • Automated remediation
  • Identity becomes the new perimeter

Executives should assess where they are vs. where the business risk demands them to be.

5. CISO Decision Matrix

Decision DriverRecommended Model
Model BiasRBAC + Clark–Wilson
Regulatory complianceRBAC + Clark–Wilson
Insider threatBiba + Separation of Duties
Cloud & APIsABAC
National securityMAC + Bell–LaPadula
Ethical conflict riskBrewer–Nash
Zero Trust strategyABAC + Continuous Authentication

No single model is sufficient. Layering is mandatory.

6. Strategic Risks CISOs Must Address

  • Role creep undermining RBAC
  • Overuse of exceptions bypassing policy intent
  • Static access in dynamic threat environments
  • Lack of linkage between access and business ownership
  • Weak auditability and accountability

Most breaches do not exploit exotic flaws—they exploit over-trusted identities.

Executive Takeaway

Access control models are governance instruments, not just technical constructs. Mature organizations evolve from static permission assignment to continuous trust evaluation, where access reflects:

  • Business role
  • Risk context
  • Data sensitivity
  • Operational necessity

For CISOs, the real challenge is not choosing a model—but ensuring access decisions consistently reflect business intent, regulatory obligation, and evolving threat reality.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.