Definition

access list (AL)

Contributor(s): Ben Cole

An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room or a computer file. 

Different types of access lists include:

 Role-based access control: permission is granted to certain individuals whose jobs require them to have access to a particular asset. 

 Network access control: permission is granted to certain individuals whose clearance certification or computing device complies with a corporate security policy. 

Context-aware network access control: permission is granted depending upon the circumstances. For example, access may be granted from the hours of nine to five only.

Integrated access management - combines features from the different types of access lists above to grant permissions.  

See also: access control list, enterprise asset management

 

This was last updated in May 2013

Continue Reading About access list (AL)

Dig Deeper on ID and access management for compliance

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close