<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asking clarification on one question in Exam Preparation</title>
    <link>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/57255#M3916</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1330323307"&gt;@savita1974&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I read this question. it is not becoming clear:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which of the following security principles are supported by role-based access control?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a. Discretionary access control, confidentiality, and non-repudiation&lt;BR /&gt;b. Mandatory access control, auditing, and integrity&lt;BR /&gt;c. Least privilege, separation of duties, and discretionary access control&lt;BR /&gt;d. Least privilege, mandatory access control, and data sensitivity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'd say the best answer is D. Role-based access control often is seen as something that is not discretionary access control. Think of it this way. People are placed into roles, and their access only changes if their role changes. If we follow that premise, we've eliminated A and C. The problem with B is that role-based access control doesn't fully serve integrity because you can have multiple users in the same role, and auditing follows that. In contrast, role-based access control can satisfy all of D. Arguably role-based access is all about least privilege (the least privilege you need to do your job, your role) and data sensitivity is just a flip on that (data should only be accessed by certain jobs/roles).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe someone else has a better assessment. I agree the question is a bit confusing. .Think of it this way: DAC focuses mostly on who and not what can be done with data, and determining the who is an ad hoc/transient decision made by the owner. In contrast, with role-based, these questions were addressed when the system was setup before the user's account or data was ever created. The system is in control. It's sort of like free will vs. predestination or maybe Neo vs. the Matrix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The real mess happens when we move users into roles that allows them to exercise DAC (or at least sort of). As silly as that sounds, it happens every day "Oh you can't access it? Here, I just check all these boxes next to permissions, see if that helps." A few months down the road, you enumerate user accounts and you find out everyone is an administrator.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Feb 2023 15:16:01 GMT</pubDate>
    <dc:creator>JoePete</dc:creator>
    <dc:date>2023-02-16T15:16:01Z</dc:date>
    <item>
      <title>Asking clarification on one question</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/57235#M3915</link>
      <description>&lt;P&gt;I read this question. it is not becoming clear:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which of the following security principles are supported by role-based access control?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a. Discretionary access control, confidentiality, and non-repudiation&lt;BR /&gt;b. Mandatory access control, auditing, and integrity&lt;BR /&gt;c. Least privilege, separation of duties, and discretionary access control&lt;BR /&gt;d. Least privilege, mandatory access control, and data sensitivity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 17:18:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/57235#M3915</guid>
      <dc:creator>savita1974</dc:creator>
      <dc:date>2023-02-15T17:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: Asking clarification on one question</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/57255#M3916</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1330323307"&gt;@savita1974&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I read this question. it is not becoming clear:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which of the following security principles are supported by role-based access control?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a. Discretionary access control, confidentiality, and non-repudiation&lt;BR /&gt;b. Mandatory access control, auditing, and integrity&lt;BR /&gt;c. Least privilege, separation of duties, and discretionary access control&lt;BR /&gt;d. Least privilege, mandatory access control, and data sensitivity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'd say the best answer is D. Role-based access control often is seen as something that is not discretionary access control. Think of it this way. People are placed into roles, and their access only changes if their role changes. If we follow that premise, we've eliminated A and C. The problem with B is that role-based access control doesn't fully serve integrity because you can have multiple users in the same role, and auditing follows that. In contrast, role-based access control can satisfy all of D. Arguably role-based access is all about least privilege (the least privilege you need to do your job, your role) and data sensitivity is just a flip on that (data should only be accessed by certain jobs/roles).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe someone else has a better assessment. I agree the question is a bit confusing. .Think of it this way: DAC focuses mostly on who and not what can be done with data, and determining the who is an ad hoc/transient decision made by the owner. In contrast, with role-based, these questions were addressed when the system was setup before the user's account or data was ever created. The system is in control. It's sort of like free will vs. predestination or maybe Neo vs. the Matrix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The real mess happens when we move users into roles that allows them to exercise DAC (or at least sort of). As silly as that sounds, it happens every day "Oh you can't access it? Here, I just check all these boxes next to permissions, see if that helps." A few months down the road, you enumerate user accounts and you find out everyone is an administrator.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 15:16:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/57255#M3916</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2023-02-16T15:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Asking clarification on one question</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/71555#M4369</link>
      <description>&lt;P&gt;The answer is &lt;FONT color="#000000"&gt;&lt;SPAN&gt;D. Least privilege (T), mandatory access control (T), and data sensitivity (T)&lt;/SPAN&gt; Here&lt;/FONT&gt; is the approach you should use to tackle this question:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use the process of elimination to knock out each wrong answer. It becomes rather easy as you find that security principles are repeated in several candidate answers. Here are each of the principles listed in the candidate answers below and why they are or are not supported (or implemented) by RBAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Discretionary access control (False) - RBAC is a non-discretionary (mandatory) access control in that the owner of the file cannot determine who has access. Access is based on roles and roles are imposed on users.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;Confidentiality (True) - RBAC enforces the security policy of confidentiality&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Non-Repudiation (False) - RBAC does not implement NR.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;Mandatory access control (True)- RBAC is a mandatory access control implementation.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Auditing (False)- RBAC is an access control and not an auditing or logging implementation.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;Integrity (True) - RBAC can enforce some elements of integrity (e.g., only a specific role can modify a file).&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;Least privilege (True) - RBAC can enforce the principle of least privilege (e.g., a specific role is only granted the accesses or privileges it needs to perform the role).&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;Separation of Duties (True) - This is a key benefit of RBAC. You can enforce SoD through roles.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;Data sensitivity (True) - Data sensitivity is a concept that data may need to be protected based on the contents. You could protect sensitive data using RBAC but that would be protection of sensitive data. This term should have been phrased "sensitive data protection".&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Now apply each of these (T/F) to the principles in the candidate answers and we get:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;A. &lt;SPAN&gt;Discretionary access control (F), &lt;FONT color="#339966"&gt;confidentiality (T)&lt;/FONT&gt;, and non-repudiation (F)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;B. &lt;FONT color="#339966"&gt;Mandatory access control (T)&lt;/FONT&gt;, auditing (F), and &lt;FONT color="#339966"&gt;integrity (T)&lt;/FONT&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;C. &lt;FONT color="#339966"&gt;Least privilege (T), separation of duties (T),&lt;/FONT&gt; and discretionary access control (F)&lt;/SPAN&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;D. Least privilege (T), mandatory access control (T), and data sensitivity (T)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 18:14:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/Asking-clarification-on-one-question/m-p/71555#M4369</guid>
      <dc:creator>landoll</dc:creator>
      <dc:date>2024-06-28T18:14:25Z</dc:date>
    </item>
  </channel>
</rss>

