{"id":33077,"date":"2025-03-17T09:53:17","date_gmt":"2025-03-17T08:53:17","guid":{"rendered":"https:\/\/ductus.global\/?p=33077"},"modified":"2025-03-17T10:17:39","modified_gmt":"2025-03-17T09:17:39","slug":"one-secure-organization-policy-based-access-control-pbac-for-enhanced-security","status":"publish","type":"post","link":"https:\/\/ductus.global\/sv\/one-secure-organization-policy-based-access-control-pbac-for-enhanced-security\/","title":{"rendered":"One Secure Organization &#8211; Policy-Based Access Control (PBAC) for Enhanced Security"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"min-height:300px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-d-plum-dark-background-color has-background-dim-60 has-background-dim\"><\/span><img decoding=\"async\" width=\"1200\" height=\"633\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech.jpg\" class=\"wp-block-cover__image-background wp-post-image\" alt=\"\" data-object-fit=\"cover\" data-object-position=\"50% 50%\" style=\"object-position:50% 50%;\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech.jpg 1200w, https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech-300x158.jpg 300w, https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech-768x405.jpg 768w, https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech-1024x540.jpg 1024w, https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech-95x50.jpg 95w, https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech-836x441.jpg 836w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-ductus-white-color has-text-color has-link-color wp-elements-8532deda216e46cabe282977fc33702d\" style=\"font-size:20px\">INSIGHT<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center has-ductus-white-color has-text-color has-link-color wp-elements-aeb4cffd9fc1ccf86c405ef5471df256\" id=\"h-one-secure-organization-policy-based-access-control-pbac-for-enhanced-security\" style=\"font-size:42px;font-style:normal;font-weight:600\">One Secure Organization \u2013 Policy-Based Access Control (PBAC) for Enhanced Security<\/h1>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<p class=\"has-preamble-font-size\">In part two of our series on one digital organization, we explore distributed authorization and access control \u200band their roles in combining physical and digital security. If you haven\u2019t read part one, where we covered the three-tiered approach to IAM, comprising an IAM Platform, IAM Framework, and IAM DevOps, as part of Zero Trust Identity Management, you can do that <a href=\"https:\/\/ductus.global\/one-secure-organization-centralized-iam-as-the-foundation-for-physical-and-digital-security\/\">here<\/a>. This time we take a deeper dive into Policy-Based Access Control (PBAC).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-strictly-controlled-premises\">Strictly controlled premises<\/h3>\n\n\n\n<p>Once again, we consider the scenario of a large industrial plant, construction site, mine, server hall, or research lab, in which a broad range of external visitors come to the site regularly, whether it\u2019s to deliver goods, service machinery and specialist equipment, or attend a meeting.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-d-mocha-light-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-policy-based-access-control-pbac-in-short\">Policy-Based Access Control (PBAC) in short<\/h3>\n\n\n\n<p>PBAC is a dynamic authorization framework that regulates access to resources based on defined policies. It comprises four key components:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"900\" height=\"900\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1.png\" alt=\"\" class=\"wp-image-33080\" style=\"width:350px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1.png 900w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1-300x300.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1-150x150.png 150w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1-768x768.png 768w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1-50x50.png 50w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1-512x512.png 512w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-1-441x441.png 441w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\">Policy-Based Access Control (PBAC) dynamically manages user permissions through structured policies, ensuring secure and efficient access control.<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ol class=\"wp-block-list\">\n<li><strong>Policy Enforcement Point (PEP):<\/strong> Serves as the gatekeeper, intercepting access requests from users or applications and forwarding them to the Policy Decision Point (PDP) for evaluation.<\/li>\n\n\n\n<li><strong>Policy Decision Point (PDP):<\/strong> Evaluates access requests against established policies to determine whether access should be granted or denied.<\/li>\n\n\n\n<li><strong>Policy Administration Point (PAP):<\/strong> Responsible for creating, storing, and maintaining the rules that govern access, ensuring policies are up-to-date and reflect organizational requirements.<\/li>\n\n\n\n<li><strong>Policy Information Point (PIP):<\/strong> Acts as the source of contextual information needed for policy evaluation, supplying attributes such as user roles, company affiliation, and approved site access.<\/li>\n<\/ol>\n\n\n\n<p>When an access request is made, the PEP forwards it to the PDP. The PDP consults the PAP to retrieve relevant policies and the PIP for necessary contextual information. Based on this data, the PDP renders an &#8221;allow&#8221; or &#8221;deny&#8221; decision, which the PEP then enforces, ensuring that access control is both dynamic and aligned with current policies.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-smaller\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-over-reliance-on-identity-governance-amp-administration-systems\">Over-reliance on Identity, Governance, &amp; Administration systems<\/h3>\n\n\n\n<p>Today, many companies with strict onsite visitor protocols rely on their existing Identity, Governance, &amp; Administration (IGA) systems to manage <strong>visitor authorization<\/strong>. However, these systems are often heavily role-based, typically synchronized with directories like Microsoft Active Directory to reflect organizational structures. <\/p>\n\n\n\n<p>While effective in some cases, this approach lacks flexibility and context awareness. For these companies, a broader, more dynamic solution would be beneficial\u2014one that considers <strong>contextual factors<\/strong> beyond static roles. This is where Policy-Based Access Control (PBAC) comes into play, enabling more agile, vendor-agnostic access management that adapts to real-world scenarios.&nbsp;<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-smaller\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-automating-and-streamlining-processes\">Automating and Streamlining processes<\/h3>\n\n\n\n<p>Utilizing a distributed PBAC framework provides the ideal solution for automating and streamlining this process. This is achieved by grouping the activities into two key distinctions <strong>Authorization<\/strong> and <strong>Access Control.<\/strong><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-smaller\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1001\" height=\"501\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-2.png\" alt=\"\" class=\"wp-image-33082\" style=\"width:550px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-2.png 1001w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-2-300x150.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-2-768x384.png 768w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-2-100x50.png 100w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-2-840x420.png 840w\" sizes=\"(max-width: 1001px) 100vw, 1001px\" \/><figcaption class=\"wp-element-caption\">Key distinctions in PBAC: Authorization defines entitlements, while Access Control manages permissions.<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-smaller\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-policy-based-advantage\">The Policy-Based Advantage<\/h3>\n\n\n\n<p>Authorization occurs in the initial visitor request phase whereby policies are used to check the entitlements of the contractor, company, work order profile, time slot, etc. These determine if, for instance, the contractor is approved to enter a particular section of a site at certain time to carry out a specific service. These policies are written by administrators in natural language as opposed to code, making it far easier for policy writers to own and manage the visitor security process. In its simplest form, a policy could be expressed as:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"444\" height=\"241\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-3.png\" alt=\"\" class=\"wp-image-33084\" style=\"width:350px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-3.png 444w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-3-300x163.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-3-92x50.png 92w\" sizes=\"(max-width: 444px) 100vw, 444px\" \/><figcaption class=\"wp-element-caption\">Example of a policy: A technician from W is allowed to enter area C only to service printers.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>However, rather than simply being satisfied with the policy being approved or rejected, this system will also check to see if there are any over-riding policies for the particular visit. It could, for instance, be that during the summer months certain company\u2019s technicians are approved to carry out additional printer servicing during July to cover for vacations. In which case, the overriding policy could be expressed as below. Similar policies could exist for an emergency situation or other scenarios.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"445\" height=\"300\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-4.png\" alt=\"\" class=\"wp-image-33086\" style=\"width:350px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-4.png 445w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-4-300x202.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-4-74x50.png 74w\" sizes=\"(max-width: 445px) 100vw, 445px\" \/><figcaption class=\"wp-element-caption\">Example of an override policy: Access is extended to areas B &amp; C for servicing printers during July.<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-preamble-font-size\" id=\"h-the-distributed-pbac-model\">The Distributed PBAC Model<\/h3>\n\n\n\n<p>By implementing PBAC at the different touchpoints of the visitor request process, it\u2019s possible to ensure a smooth flow from initial request through to badge printing, registration of vehicles parking permits, and gate and door access. The process can also be integrated with ERP, IGA and other relevant IT systems.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"1000\" height=\"478\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-6.png\" alt=\"\" class=\"wp-image-33089\" style=\"width:700px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-6.png 1000w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-6-300x143.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-6-768x367.png 768w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-6-105x50.png 105w, https:\/\/ductus.global\/wp-content\/uploads\/2025\/03\/IDM-6-840x402.png 840w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Example of the Distributed PBAC Model: Ensuring seamless visitor access by integrating entitlements, applications, IAM, and access control across multiple touchpoints.<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-medium\"><\/div>\n\n\n\n<div class=\"wp-block-group has-d-mocha-light-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\" id=\"h-get-started\">Get started<\/h3>\n\n\n\n<p>If you recognize these issues or want to develop a <strong>single security solution<\/strong> for physical and digital security but don\u2019t know where to start, our consultants can support you. We recommend you begin with a particular pain point. Our team will define a PBAC framework along with a fit-for-purpose IAM platform, which can be run in a pilot project.<\/p>\n\n\n\n<p>Don\u2019t wait until it\u2019s too late. <strong>Get in touch<\/strong> and let\u2019s get started.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\" id=\"contact-us\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" width=\"340\" height=\"340\" src=\"https:\/\/stage.ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner.jpg\" alt=\"\" class=\"wp-image-28264\" style=\"width:170px;height:170px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner.jpg 340w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-300x300.jpg 300w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-150x150.jpg 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-50x50.jpg 50w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-anders-essner\">Anders Essner<\/h3>\n\n\n\n<p>Phone: +46 (70) 513 56 19<br>anders.essner(at)ductus.se<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In part two of our series on one digital organization, we explore distributed authorization and access control \u200band their roles in combining physical and digital security. If you haven\u2019t read part one, where we covered the three-tiered approach to IAM, comprising an IAM Platform, IAM Framework, and IAM DevOps, as part of Zero Trust Identity [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16815,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[41,42],"tags":[4248],"class_list":["post-33077","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insight","category-insights-it-consulting","tag-infrastructure-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/33077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/comments?post=33077"}],"version-history":[{"count":5,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/33077\/revisions"}],"predecessor-version":[{"id":33100,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/33077\/revisions\/33100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/media\/16815"}],"wp:attachment":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/media?parent=33077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/categories?post=33077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/tags?post=33077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}