access list (AL)

An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room or a computer file. 

An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room or a computer file. 

Different types of access lists include:

 Role-based access control: permission is granted to certain individuals whose jobs require them to have access to a particular asset. 

 Network access control: permission is granted to certain individuals whose clearance certification or computing device complies with a corporate security policy. 

Context-aware network access control: permission is granted depending upon the circumstances. For example, access may be granted from the hours of nine to five only.

Integrated access management - combines features from the different types of access lists above to grant permissions.  

See also: access control list, enterprise asset management

 

This was first published in May 2013

Continue Reading About access list (AL)

Glossary

'access list (AL)' is part of the:

View All Definitions

Dig deeper on ID and access management for compliance

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close