What’s an Access Control Matrix?

Print anything with Printful



An access control matrix is a static delineation of permissions in a computer system that lists objects and subjects to provide information about different rights. It can reduce the risk of compromise and limit damage caused by security exploits. Default settings may be sufficient, but changes should be made carefully.

An access control matrix is ​​a static delineation of permissions in a computer system. It has the ability to provide very fine granular control for particular operations and processes and can be a component of a cyber security system. Strict permissions are useless without firm controls on who and what can change those permissions, and so other security measures are also needed.

Within an access control matrix, anything that a system might need to access, such as a file, piece of hardware, or process, is known as an object. Entities such as user processes and other files that may require access have varying permissions, known as rights. The matrix lists objects along one axis and subjects along another to provide information about the different rights assigned to different subjects. Usually the goal is to keep rights limited to reduce the risk of compromise.

For example, a particular file might just need to be able to read another file. It will only be given read permissions and will not be able to make any changes to the file. Conversely, a process might require full rights to perform functions such as moving files, storing data, or allowing a user to edit a word processing document. The access control matrix does not change unless a technician actively changes a setting; another example can be seen with internet servers, where the administrator can determine the levels of permissions available to visitors through a matrix.

By limiting capacity, a security administrator can reduce the risk of a system being compromised. When a problem develops, the administrator can use the access control matrix to find out which entities had the necessary rights to do something like corrupt another file or distribute information without authorization. Tight control can also limit the damage caused by security exploits such as hacking into attached external hard drives, as the hacker may not be able to do anything meaningful with that access.

Many systems come with a default access control matrix set to basic security standards. For many users’ purposes, this may be sufficient and changes may not be recommended. The change could make the system less secure or create access problems that could limit the functionality of the system. When a technician needs to make changes, that person can review the system and needs to decide the best changes to make. If necessary, they can be restored to their previous settings with a system reset.




Protect your devices with Threat Protection by NordVPN


Skip to content