Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down

This episode focuses on discretionary access control (DAC), a model where resource owners decide who gets access and what level of permission is granted, and it helps you answer CC questions that compare access control approaches. You will learn how DAC commonly appears in operating systems through file and folder permissions, access control lists, and user-managed sharing settings. We will discuss the strengths of DAC, such as flexibility and ease of delegation, alongside weaknesses such as inconsistent permissioning, excessive sharing, and difficulty enforcing organization-wide rules when owners make independent decisions. You will practice identifying DAC in scenarios involving shared drives, collaboration platforms, and user-controlled resource permissions, and you will learn how to recognize when DAC increases confidentiality risk through accidental oversharing. Real-world best practices will include establishing standards for sharing, monitoring for excessive permissions, using groups and roles where possible to reduce complexity, and reviewing access periodically to prevent permission sprawl. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 36 — Discretionary Access Control: Ownership, Permissions, and Where It Breaks Down
Broadcast by