What is Attribute-Based Access Control (ABAC)?
Attribute-based access control (ABAC) is a security model that grants or denies access to resources based on attributes associated with users, data, systems, and the environment. Unlike traditional models that rely on roles alone, ABAC allows for fine-grained, dynamic control over who can access what – and under what conditions.
In short, ABAC answers the question:
“Can this person perform this action on this resource, under these circumstances?”
How ABAC Works
Access decisions are made by evaluating a set of attributes, such as:
- User attributes (e.g., department, job title, clearance level)
- Resource attributes (e.g., file classification, content type, sensitivity)
- Environment attributes (e.g., time, location, device, IP address)
- Action attributes (e.g., read, edit, print, delete)
A policy engine processes these attributes against defined rules to allow or deny access – in real time.
Why ABAC Matters
ABAC enables:
- Granular security based on specific data and context
- Dynamic policies that adapt to real-world situations (e.g., block access from outside the office after hours)
- Smarter automation of access controls without manual intervention
- Stronger compliance with data protection regulations and internal governance
- Better support for complex, multi-role environments, where users may need different levels of access across contexts
ABAC is ideal for modern, hybrid cloud, remote work, and zero trust environments where static roles alone aren’t enough.
ABAC vs. RBAC
Feature | RBAC (Role-Based) | ABAC (Attribute-Based) |
---|---|---|
Access Based On | Predefined user roles | Combinations of attributes |
Flexibility | Moderate | HIgh |
Context Awareness | Low | High |
Use Cases | Simple organization structures | Dynamic, scalable environments |
Example | “Managers can edit reports” | “Managers in HR can edit reports during business hours from corporate devices” |
Many organizations use RBAC and ABAC together, combining the clarity of roles with the flexibility of attributes.
Real-World Examples of ABAC
- A remote contractor can view a file only during business hours and only from a registered IP address
- An HR staff member can access employee salary information, but only if they’re in the HR department and using a company-issued device
- A healthcare provider can access patient records only within their assigned department and only for patients they are treating
How Fasoo Uses ABAC for Data-Centric Security
Fasoo Enterprise DRM (FED) integrates ABAC to enforce document-level access policies based on real-time attributes – no matter where the file goes.
With FED, access can depend on:
- User identity and department
- File classification or document tags (highly confidential, confidential, general)
- Access location (IP address)
- Status (online/offline)
- Device type
Even if a file is downloaded or shared externally, FED continuously evaluates attributes to enforce or revoke access dynamically.
Resources
Product Overview
Video
Use Case