Sticky Banner Visual Mobile 3

Spring deal: Get a free upgrade for 3 months on annual offers.

Spring deal: Free upgrade on annual offers. Claim now!

Claim Now!

Expressvpn Glossary

Discretionary access control (DAC)

Discretionary access control (DAC)

What is discretionary access control?

Discretionary access control (DAC) is a model where the owner of a resource decides who can access it and what actions they’re allowed to perform. The resource may be a file, folder, or other system object, and permissions are typically granted to specific users or groups.

DAC is designed to support everyday sharing and collaboration. It allows access to be immediately granted or revoked directly, without relying on centrally managed rules. This makes it more practical for routine use rather than strict policy enforcement.

How does discretionary access control work?

When access is configured under DAC, the resource owner sets which users or groups are allowed to perform specific actions on the resource. These actions commonly include reading, modifying, executing, or deleting.Flow diagram showing how discretionary access control assigns permissions and allows or denies access.The operating system keeps a record of the permissions, usually in the form of an access control list (ACL). Each time a user or process attempts to access a resource, the system checks the ACL and either allows or blocks the request.

The resource owner can change the stored permissions at any time.

Benefits of DAC

  • Easy to manage: DAC allows access to be controlled directly at the resource level. It doesn’t require strict policies to be followed or administrator involvement, making it suitable for routine access management of low-risk resources.
  • Supports everyday collaboration: Access privileges can be adjusted as needed. This makes DAC practical for environments where permissions need to change frequently.
  • Enables immediate access changes: Permissions can be granted and revoked quickly. This is useful for short-term projects that only require certain users to gain temporary access.
  • Fits personal devices and small teams: In settings with limited scale and clear accountability, DAC can provide sufficient control without the complexity of enterprise access models.

Risks and limitations

  • Can lead to excessive permissions: Because users control access privileges themselves with no overarching policy enforcement, it’s possible for resources to be mistakenly left with overly broad or outdated access permissions. This can lead to situations where one compromised user account can expose a wide array of resources to cybercriminals and/or malware.
  • Not suited to strict or regulated environments: DAC doesn’t enforce uniform rules across an organization. This limits its usefulness when consistent, centrally enforced controls are required.
  • Becomes harder to manage at scale: As the number of users and resources increase, discretionary permissions can become more difficult to track and standardize.

Real-world examples of DAC

  • Shared device file permissions: Operating systems like Windows, Unix, and Linux implement DAC through file permissions. When someone creates a document or folder, they can decide which other user accounts on the device have permission to access it or make changes.
  • Corporate networks: DAC allows employees on the same network to collaborate on resources via shared files or folders.
  • Cloud storage: Remote access to cloud resources can be managed with DAC.

DAC vs. other access control models

Different access control models are designed to solve different problems. The key difference between them lies in who makes access decisions and how consistently those decisions are enforced.

Access control model How access is defined What it’s best suited for Key limitation
Discretionary access control (DAC) Individual users set permissions on resources they control Personal devices, small teams, flexible collaboration Permissions can become inconsistent or overly broad
Mandatory access control (MAC) Centrally enforced rules based on classifications or labels High-security or regulated environments Limited flexibility for everyday sharing
Role-based access control (RBAC) Permissions are assigned based on predefined roles Larger organizations with defined job functions Roles can become too broad if not carefully maintained

Further reading

FAQ

Is DAC secure?

Discretionary access control (DAC) can be secure when permissions are set and reviewed carefully, but it’s more susceptible to misconfiguration than centrally enforced access models. Its effectiveness depends on the individual judgment of the users who control the resources.

What operating systems use DAC?

Most mainstream operating systems, including Windows, Linux, and other Unix-like systems, use discretionary access control (DAC) concepts for file and resource sharing.

How is DAC different from MAC?

Discretionary access control (DAC) allows the resource owner to decide who gets access. Mandatory access control (MAC) enforces access based on centrally defined rules that users typically cannot override, regardless of resource ownership.

Why do organizations prefer RBAC over DAC?

Role-based access control (RBAC) ties access privileges to job roles rather than individuals. This makes permissions easier to manage, audit, and update across large or changing teams. Discretionary access control (DAC), on the other hand, can quickly become hard to manage in medium-to-large organizations.

What permissions can DAC assign?

Discretionary access control (DAC) commonly controls permissions such as read, write, execute, modify, and delete, though it ultimately depends on the system and resource type.
Get Started