SHARE
Facebook X Pinterest WhatsApp

Simplify File Sharing and User Access via Attribute Based Access Control

Access control usually requires that a user is given access to perform a specific operation on an object which they have been given permission to access in a specified way (e.g., a user editing a Word document). Their ability to access the file is a result of permissions granted to them due to their assignment […]

Written By
thumbnail
Kim Mays
Kim Mays
Jan 24, 2014

Access control usually requires that a user is given access to perform a specific operation on an object which they have been given permission to access in a specified way (e.g., a user editing a Word document). Their ability to access the file is a result of permissions granted to them due to their assignment to a particular group or role.

IT professionals and users alike have dealt with this often frustrating form of access control for many years. In IT, it is not always an easy task to assign certain capabilities or roles to single users or groups, and thus access control can be difficult to manage.

A different way to manage such access can be granted via attribute based access control (ABAC), where user requests for access are granted based on various attributes of the file or object along with other conditions that are relevant to current policies.

In 2009, the Federal CIO Council published the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Plan v1.0, to provide guidance to federal organizations that were reconfiguring their logical access control architectures to include the evaluation of attributes in order to give access between organizations within the Federal enterprise. Three years later, the FICAM Roadmap and Implementation Plan v2.0 identified ABAC as the recommended access control model to share between varied and different organizations.

In our IT Downloads, the Guide to Attribute Based Access Control (ABAC) Definition and Considerations provides Federal agencies and other enterprise organizations an opportunity to learn more about ABAC and its functionalities. The document was created by the National Institute of Standards Technology (NIST), and also provides details on how to plan for, design, implement, and put into operation the components of ABAC within the enterprise.

According to the document:

When deployed across an enterprise for the purposes of increasing information sharing among diverse organizations, ABAC implementations can become complex—supported by the existence of an attribute management infrastructure, machine-enforceable policies, and an array of functions that support access decisions and policy enforcement.

In addition to the basic policy, attribute, and access control mechanism requirements, the enterprise must support management functions for enterprise policy development and distribution, enterprise identity and subject attributes, subject attribute sharing, enterprise object attributes, authentication, and access control mechanism deployment and distribution. The development and deployment of these capabilities requires the careful consideration of a number of factors that will influence the design, security, and interoperability of an enterprise ABAC solution.

High-level IT security professionals will benefit from this informative document. It can assist enterprises (both Federal and non-governmental) to maintain control of data while they improve file sharing capabilities among users and between organizations.

Recommended for you...

Top Managed Service Providers (MSPs) 2022
Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.