Esc
Access Mediation
Definition
Access mediation is the process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., Federal buildings, military establishments, border crossing entrances).
Synonyms: Access Control .
loading...
Technique Subclasses
There are 14 techniques in this category, Access Mediation.
Name | ID | Definition | Synonyms |
---|---|---|---|
Access Mediation | D3-AMED | Access mediation is the process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., Federal buildings, military establishments, border crossing entrances). | Access Control |
- System Call Filtering | D3-SCF | Controlling access to local computer system resources with kernel-level capabilities. | System Call Control |
- IO Port Restriction | D3-IOPR | Limiting access to computer input/output (IO) ports to restrict unauthorized devices. | |
- Credential Transmission Scoping | D3-CTS | Limiting the transmission of a credential to a scoped set of relying parties. | Phishing Resistant Authentication |
- Physical Access Mediation | D3-PAM | Physical access mediation is the process of granting or denying specific requests to enter specific physical facilities (e.g., Federal buildings, military establishments, border crossing entrances.) | Physical Access Control |
- Network Access Mediation | D3-NAM | Network access mediation is the control method for authorizing access to a system by a user (or a process acting on behalf of a user) communicating through a network, including a local area network, a wide area network, and the Internet. | Network Access Control |
- Network Resource Access Mediation | D3-NRAM | Control of access to organizational systems and services by users or processes over a network. | Remote Access Control |
- Local File Access Mediation | D3-LFAM | Restricting access to a local file by configuring operating system functionality. | Local File Access Control |
- LAN Access Mediation | D3-LAMED | LAN access mediation encompasses the application of strict access control policies, systematic verification of devices, and authentication mechanisms to govern connectivity to a Local Area Network. | |
- Remote File Access Mediation | D3-RFAM | Remote file access mediation is the process of managing and securing access to file systems over a network to ensure that only authorized users or processes can interact with remote files. | File Share Access Mediation |
- Routing Access Mediation | D3-RAM | Routing access mediation is a network security approach that manages and controls access at the network layer using VPNs, tunneling protocols, firewall rules, and traffic inspection to ensure secure and efficient data routing. | |
- Web Session Access Mediation | D3-WSAM | Web session access mediation secures user sessions in web applications by employing robust authentication and integrity validation, along with adaptive threat mitigation techniques, to ensure that access to web resources is authorized and protected from session-related attacks. | |
- Endpoint-based Web Server Access Mediation | D3-EBWSAM | Endpoint-based web server access mediation regulates web server access directly from user endpoints by implementing mechanisms such as client-side certificates and endpoint security software to authenticate devices and ensure compliant access. | |
- Proxy-based Web Server Access Mediation | D3-PBWSAM | Proxy-based web server access mediation focuses on the regulation of web server access through intermediary proxy servers. |
loading...
References
All
Guideline
The following references were used to develop the Access Mediation knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Committee on National Security Systems (CNSS) Glossary
Reference Type: Guideline Organization: Committee on National Security Systems (CNSS)
D3FEND™
A knowledge graph of cybersecurity countermeasures