Access Control: What It Is, Models, Best Practices, and Compliance Requirements
2026-03-07
By Orbiq Team

Access Control: What It Is, Models, Best Practices, and Compliance Requirements

A practical guide to access control — what it is, access control models (RBAC, ABAC, MAC, DAC), the principle of least privilege, how access control maps to ISO 27001, SOC 2, NIS2, and DORA requirements, and how B2B companies can implement effective access management.

Access Control
RBAC
Least Privilege
Identity Management
ISO 27001
SOC 2
Zero Trust

Access Control: What It Is, Models, Best Practices, and Compliance Requirements

Access control is the practice of restricting access to systems, data, and resources to authorised users based on defined policies. It is a foundational security control that underpins every compliance framework, from ISO 27001 and SOC 2 to NIS2 and DORA.

For B2B companies, access control is one of the first areas enterprise buyers scrutinise. Security questionnaires routinely ask about access management policies, authentication mechanisms, privileged access controls, and access review processes. Demonstrating mature access control practices builds trust and accelerates deal cycles.

This guide covers access control models, the principle of least privilege, privileged access management, compliance mapping, and how to implement effective access control.


Access Control Models

Choosing the Right Model

ModelHow It WorksBest ForComplexity
RBAC (Role-Based)Permissions assigned to roles; users assigned to rolesMost enterprise environmentsMedium
ABAC (Attribute-Based)Access decisions based on user, resource, action, and environment attributesComplex environments needing fine-grained controlHigh
MAC (Mandatory)Access enforced by security classifications and clearance levelsGovernment, military, classified environmentsHigh
DAC (Discretionary)Resource owners control access at their discretionFile systems, small teamsLow
PBAC (Policy-Based)Centralised policies govern access across systemsLarge-scale environments with diverse access needsHigh

RBAC in Practice

RBAC is the most widely adopted model for B2B companies. Permissions are assigned to roles, and users are assigned to one or more roles based on their job function.

ComponentDescriptionExample
RoleA named collection of permissions aligned to a job function"Finance Manager", "Developer", "Security Analyst"
PermissionAn allowed action on a specific resource"Read financial reports", "Deploy to staging"
User-role assignmentMapping users to their organisational rolesJane Smith → Finance Manager
Role hierarchyRoles can inherit permissions from parent roles"Senior Developer" inherits "Developer" permissions
ConstraintsRules that restrict role combinationsCannot hold both "Payment Approver" and "Payment Initiator"

The Principle of Least Privilege

Core Concepts

The principle of least privilege (PoLP) requires that every user, application, and system has only the minimum access needed to perform its function.

PrincipleImplementation
Default denyStart with no access; grant permissions explicitly
Need-to-knowAccess to data only when required for the specific task
Time-limited accessElevated privileges expire after a defined period
Scope limitationAccess restricted to specific resources, not broad categories
Regular reviewPermissions reviewed and pruned on a regular cycle

Privilege Creep

Privilege creep occurs when users accumulate access rights over time — through role changes, project assignments, or ad-hoc requests — without corresponding revocations. Left unchecked, it leads to:

  • Users with far more access than their current role requires
  • Increased attack surface if an account is compromised
  • Audit findings for excessive or inappropriate access
  • Violations of segregation of duties

Prevention: Conduct quarterly access reviews, implement automated access recertification, and enforce access expiry for temporary permissions.


Privileged Access Management (PAM)

Why PAM Matters

Privileged accounts (administrators, root, service accounts) have elevated access that can affect entire systems. Compromising a privileged account gives an attacker broad access to infrastructure, data, and configurations.

PAM ControlPurpose
Credential vaultingStore privileged credentials in a secure vault with automated rotation
Just-in-time (JIT) accessGrant elevated privileges temporarily; revoke after use
Session recordingRecord and monitor all privileged sessions for audit
Break-glass proceduresEmergency access with full audit trail and post-incident review
Separation of dutiesNo single person has unchecked privileged access
Service account managementInventory, rotate, and monitor non-human privileged accounts

Authentication Mechanisms

Multi-Factor Authentication (MFA)

Factor TypeExamplesStrength
Something you knowPassword, PIN, security questionsLow (can be phished or guessed)
Something you haveHardware security key (FIDO2/WebAuthn), authenticator app, smart cardHigh (physical possession required)
Something you areFingerprint, facial recognition, iris scanHigh (biometric)

Best practice: Require MFA for all users, with phishing-resistant methods (hardware keys, passkeys) for privileged accounts and critical systems.

Authentication Best Practices

PracticeDescription
Enforce MFARequire multi-factor authentication for all users
Use phishing-resistant MFAHardware keys or passkeys for privileged access
Eliminate shared accountsEvery user has a unique, identifiable account
Implement SSOSingle Sign-On reduces password fatigue and centralises authentication
Password policiesMinimum length, complexity, and prohibition of known-compromised passwords
Session managementAutomatic timeout, re-authentication for sensitive actions

Access Control and Compliance

Regulatory Mapping

RequirementFrameworkAccess Control Alignment
Access control policyISO 27001 A.5.15, SOC 2 CC6.1Documented access control rules and principles
Identity managementISO 27001 A.5.16User lifecycle management (joiners, movers, leavers)
AuthenticationISO 27001 A.5.17, A.8.5, SOC 2 CC6.1MFA, secure credential management
Access provisioningISO 27001 A.5.18, SOC 2 CC6.2Role-based provisioning with approval workflows
Privileged accessISO 27001 A.8.2, SOC 2 CC6.1PAM controls, monitoring, and audit
Access reviewsISO 27001 A.5.18, SOC 2 CC6.2, CC6.3Regular recertification of user access
Network securityNIS2 Art. 21(2)(b), DORA Art. 9Network access controls and segmentation
ICT securityDORA Art. 9(4)Strong authentication, access rights management

SOC 2 Trust Services Criteria — Access Control

CriterionFocus
CC6.1Logical and physical access controls, authentication mechanisms
CC6.2Registration and authorisation of new users, provisioning access
CC6.3Removal of access when no longer needed (termination, role change)
CC6.4Restriction and monitoring of physical access
CC6.5Protection against external threats (network controls, firewalls)
CC6.6Encryption and protection of data in transit and at rest

User Access Lifecycle

Joiners, Movers, Leavers (JML)

PhaseActionsTimeframe
JoinerCreate accounts, assign roles based on job function, grant minimum required access, provide security trainingBefore or on start date
MoverReview current access, revoke access no longer needed, grant access for new role, update role assignmentsWithin 24 hours of role change
LeaverDisable accounts immediately, revoke all access, recover company devices and credentials, archive dataOn or before last day

Common Access Control Weaknesses

WeaknessRiskMitigation
No formal JML processOrphaned accounts, excessive accessDocument and automate JML procedures
Missing access reviewsPrivilege creep, audit findingsSchedule quarterly automated reviews
Shared accountsNo accountability, audit gapsMandate individual accounts for all users
No MFACredential theft, account takeoverEnforce MFA across all systems
Over-provisioned rolesExcessive access, blast radiusApply least privilege, right-size roles
No PAM controlsUnmonitored admin accessImplement credential vaulting and session recording

How Orbiq Supports Access Control

  • Trust Center: Publish your access control posture — policies, MFA enforcement, and review processes for buyer self-service
  • Continuous Monitoring: Track access control compliance across ISO 27001, SOC 2, NIS2, and DORA
  • AI-Powered Questionnaires: Auto-respond to access control questions from enterprise buyers using your documented controls
  • Evidence Management: Centralise access review records, JML documentation, and PAM evidence for auditors

Further Reading


This guide is maintained by the Orbiq team. Last updated: March 2026.