My Cyber Lab Journal

Learning, labs, and notes from my cybersecurity journey

View My GitHub Profile

28 August 2025

ISC2 CC Domain 3

by

Domain 3: Access Control Concepts

This summary outlines key concepts in access control, including types of security controls, defense strategies, and privilege management, rewritten for a professional portfolio.


Security Controls Overview

Security controls are measures implemented to protect the confidentiality, integrity, and availability (CIA) of assets. Examples include firewalls, which regulate incoming and outgoing traffic to prevent unauthorized access.

Access control determines who can interact with an asset and what actions they are allowed to perform.


Key Components of Access Control


Defense in Depth

Defense in depth is a layered approach combining people, processes, and technology to deter attacks. Examples:

Types of controls:

Example: A data center may integrate all three: administrative policies, logical tools, and physical barriers to protect assets.


Control Implementation


Role-Based Access Control (RBAC)


Privileged Access Management

Example: Helpdesk personnel with password reset permissions are monitored closely; logs are compared against tickets to detect anomalies.


Monitoring and Oversight


Key Takeaways

tags: