AC-24(1)—Access Control Decisions
>Control Description
>Supplemental Guidance
In distributed information systems, authorization processes and access control decisions may occur in separate parts of the systems. In such instances, authorization information is transmitted securely so that timely access control decisions can be enforced at the appropriate locations. To support the access control decisions, it may be necessary to transmit supporting security attributes as part of the access authorization information.
This is due to the fact that in distributed information systems, there are various access control decisions that need to be made and different entities (e.g., services) make these decisions in a serial fashion, each requiring some security attributes to make the decisions. Protecting access authorization information (i.e., access control decisions) ensures that such information cannot be altered, spoofed, or otherwise compromised during transmission.
Ask AI
Configure your API key to use AI features.