Access Control (Physical and Logical)

Access Control

Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization. There are two types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms, and physical IT assets. Logical access control limits connections to computer networks, system files, and data. These are further explained below. 

Logical Access Control

Logical Access Control is the ability and means to allow or deny logical or computer-based access to data of one kind or another. Keeping in mind the CIA of Cybersecurity (Confidentiality, Integrity, and Availability) logical access control typically pertains to Confidentiality – making sure only the people who should have access to something are the ones with access to that data set.

Physical Access Control

Physical Access Control is the ability and processes to grant and deny physical access to locations within a building, company, or even within a room at a company.  Techniques can involve using RFID picture ID badges that must be worn and displayed by employees throughout your offices, to separate control entry points for server rooms.  In high-security locations such as a data center, the use of ‘Man Trap‘ is a requirement, although, CyberHoot believes we should begin calling them ‘Person Trap‘ as we know quite a few exceptional social engineering experts who are most definitely not men.

What Does This Mean for my SMB?

It’s important to have both policies and technology in place to implement discretionary and mandatory access controls. Having policies and technical controls in place help staff avoid dangerous and costly cybersecurity events. Incorporate the Principle of Least Privilege in your organization to improve your overall cybersecurity posture.

Beyond Access Controls – Best Practices to Adopt

CyberHoot recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot.

Access Control

Physical Access Control

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.


Sources: CNSSI 4009, TechTarget

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.