If you’re preparing for the ISC2 Certified in Cybersecurity (CC) exam, access control models are one of the most important topics you’ll need to master. Access control models — including DAC, MAC, RBAC, and ABAC — fall squarely within Domain 3: Access Controls Concepts, which makes up 22% of the 100-question exam. That means roughly 22 questions could touch on this area. Understanding not just what these models are, but why organizations choose one over another, is exactly what the exam tests. Let’s break this down.
What Is an Access Control Model?
An access control model is a framework that defines how subjects (users, processes, or systems) gain access to objects (files, databases, resources). Every organization needs a way to answer the question: who is allowed to do what, and under what conditions? The model chosen directly impacts security posture, operational flexibility, and compliance.
The CC exam expects you to recognize each model by name, understand its core logic, identify its strengths and weaknesses, and know real-world scenarios where it applies. Let’s go through each one.
Discretionary Access Control (DAC)
Discretionary Access Control (DAC) gives resource owners the authority to decide who can access their files or data. If you’ve ever right-clicked a file in Windows and set sharing permissions, you’ve used DAC in practice.
How DAC Works
In a DAC environment, each object has an owner, and that owner controls the access control list (ACL) for that object. Owners can grant or revoke access to other users at their discretion — no central authority needs to approve each change.
Strengths and Weaknesses of DAC
- Strength: Highly flexible — owners can respond quickly to changing access needs without IT involvement.
- Weakness: Decentralized control creates risk. A user might accidentally (or carelessly) grant access to sensitive data, making DAC unsuitable for high-security environments.
- Weakness: Susceptible to Trojan horse attacks, where malicious software runs with the privileges of the user who launched it.
Real-world use case: Small businesses, home networks, and general-purpose operating systems like Windows and Linux use DAC as the default model.
Mandatory Access Control (MAC)
Mandatory Access Control (MAC) is the strictest model. Here, access decisions are made by a central authority — not the resource owner — based on security labels or classifications assigned to both subjects and objects.
How MAC Works
Every subject (user or process) is assigned a clearance level, and every object (file, database record) is assigned a classification label. The system enforces access based on these labels. A user with a SECRET clearance cannot access TOP SECRET data, regardless of what any individual resource owner might prefer.
Strengths and Weaknesses of MAC
- Strength: Extremely high security — no individual user can override the policy.
- Strength: Ideal for environments where data confidentiality is non-negotiable.
- Weakness: Rigid and administratively intensive. Changing access requires changing labels, which is a controlled process.
Real-world use case: Government and military systems, classified intelligence networks, and environments subject to strict regulatory compliance frequently rely on MAC.
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC) is one of the most widely adopted models in enterprise environments. Instead of assigning permissions directly to individual users, permissions are assigned to roles, and users are assigned to those roles.
How RBAC Works
Think of a hospital: a nurse has different access rights than a physician, who has different rights than a billing administrator. In RBAC, you define roles (Nurse, Physician, Billing Admin), assign the appropriate permissions to each role, and then assign users to the correct role. When someone’s job changes, you simply change their role — not dozens of individual permissions.
Strengths and Weaknesses of RBAC
- Strength: Simplifies administration significantly — especially in large organizations with high staff turnover.
- Strength: Supports the principle of least privilege by ensuring users only get access appropriate to their role.
- Weakness: Roles can accumulate excess permissions over time (called role explosion), especially if not regularly audited.
Real-world use case: Enterprise IT environments, healthcare systems, SaaS platforms, and cloud services like AWS IAM roles all leverage RBAC extensively.
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC) is the most granular and flexible model. Access decisions are based on a combination of attributes — characteristics of the user, the resource, and the environment.
How ABAC Works
Rather than a simple role assignment, ABAC evaluates policies like: “A user can access this document if they are in the Finance department, located in the EU, and it is a weekday between 9am and 5pm.” Attributes can include job title, department, location, time of day, device type, and more.
Strengths and Weaknesses of ABAC
- Strength: Extremely fine-grained control — supports complex, context-aware policies that no other model can match.
- Strength: Scales well in dynamic environments like cloud platforms and zero trust architectures.
- Weakness: Complex to design, implement, and troubleshoot. Policy management requires careful planning.
Real-world use case: Cloud-native environments, zero trust network implementations, and government data-sharing frameworks increasingly rely on ABAC for fine-grained access decisions.
Comparing the Four Models Side by Side
Here’s a quick reference to help cement the differences:
- DAC: Owner-controlled, flexible, lower security — best for general-purpose systems
- MAC: System-enforced labels, rigid, highest security — best for classified or regulated environments
- RBAC: Role-based permissions, scalable, enterprise-friendly — best for large organizations
- ABAC: Attribute-driven policies, highly granular, complex — best for dynamic, cloud, or zero trust environments
The CC exam will often present you with a scenario and ask which model is most appropriate. Practice identifying the key indicator in the scenario — “the owner sets permissions” points to DAC; “security labels” points to MAC; “job roles” points to RBAC; “department, location, and time of day” points to ABAC.
Test Your Knowledge
Let’s check your understanding with two practice-style questions similar to what appears on the CC exam.
Question 1: A government agency assigns clearance levels to both personnel and documents. Access is granted only when the personnel clearance matches or exceeds the document classification. Which access control model does this describe?
- Discretionary Access Control (DAC)
- Role-Based Access Control (RBAC)
- Mandatory Access Control (MAC)
- Attribute-Based Access Control (ABAC)
Answer: C — Mandatory Access Control (MAC). The defining feature here is centrally assigned security labels on both subjects and objects, with access enforced by the system — not the resource owner. This is the hallmark of MAC, commonly used in military and government classification systems.
Question 2: An organization wants to grant access based on a combination of a user’s department, their current location, and the time of day. Which access control model best supports this requirement?
- Mandatory Access Control (MAC)
- Discretionary Access Control (DAC)
- Role-Based Access Control (RBAC)
- Attribute-Based Access Control (ABAC)
Answer: D — Attribute-Based Access Control (ABAC). When multiple contextual factors (department, location, time) combine to form an access decision, that’s ABAC. RBAC alone couldn’t handle the time-of-day or location conditions without additional attribute logic.
Want more practice? Certcy has 110+ questions like these — download free.
Study Tips for Access Control Models on the CC Exam
- Learn the distinguishing keywords: “owner decides” = DAC; “labels/clearances” = MAC; “roles” = RBAC; “attributes/context” = ABAC.
- Understand, don’t just memorize: The exam presents scenarios, not definitions. Ask yourself why an organization would choose each model in a given situation.
- Connect to the principle of least privilege: All four models support least privilege — but RBAC and ABAC implement it more precisely in enterprise environments.
- Practice with scenario-based questions: The CC exam is scenario-heavy. Get comfortable reading a business context and identifying the correct model quickly.
- Review Domain 3 thoroughly: At 22% of the exam, Access Controls is one of the highest-weighted domains. Pair your model knowledge with authentication concepts like MFA and SSO for maximum coverage.
Frequently Asked Questions
What percentage of the ISC2 CC exam covers access control models?
Access Controls Concepts make up 22% of the CC exam, which consists of 100 multiple-choice questions answered in 120 minutes. That means you can expect roughly 20-22 questions touching on physical and logical access controls, authentication, authorization models, and identity management. Access control models like DAC, MAC, and RBAC are explicitly called out in the domain objectives, making them high-priority study topics.
Is ABAC on the ISC2 CC exam?
The ISC2 CC official exam outline explicitly mentions DAC, MAC, and RBAC in Domain 3. ABAC is increasingly tested as a concept in broader access control discussions, especially in the context of zero trust and cloud environments. Understanding ABAC gives you a competitive edge and helps you answer scenario questions that involve complex, conditional access requirements — even if it isn’t always listed by name in every study guide.
What’s the difference between authentication and authorization in access control?
Authentication verifies who you are (e.g., username/password, MFA). Authorization determines what you’re allowed to do after you’ve been authenticated (e.g., which files you can read or edit). Access control models like DAC, MAC, RBAC, and ABAC all govern the authorization phase — they define the rules the system uses once your identity has been confirmed. The CC exam tests both concepts and expects you to distinguish between them clearly.
How do I pass the ISC2 CC exam on my first attempt?
The CC exam requires a passing score of 700 out of 1000 on a linear 100-question format. To pass on your first attempt, focus on understanding concepts in context rather than memorizing definitions. Study all five domains with attention to their weightings — Security Principles (26%), Network Security (24%), and Access Controls (22%) carry the most weight. Use scenario-based practice questions regularly to build the applied thinking the exam rewards. Try free practice questions with Certcy to identify your weak areas and get AI-personalized study recommendations.
Ready to put this knowledge to work? Download Certcy free and access 310+ expert-written questions across CompTIA A+, ISC2 CC, and ISC2 SSCP. With gamified quizzes, spaced-repetition flashcards, and an AI study plan that adapts to your weak spots, Certcy is the study partner that meets you where you are — and gets you where you need to be. Start studying free today and walk into your CC exam with confidence.
Ready to Pass Your Certification?
Practice with 310+ expert-written questions across CompTIA A+, ISC2 CC, and SSCP.
Free to start — no credit card required.
Continue Reading
Related Study Guides
Cryptography Basics for the ISC2 SSCP Exam: Encryption, Hashing, and Digital Signatures
Cybersecurity CertificationsWhat Is the ISC2 Certified in Cybersecurity (CC)? Everything You Need to Know
Cybersecurity CertificationsSSCP vs CISSP: What's the Difference and Which Do You Need?