Data Labeling
Access control
PKI
Public key-based authentication is particularly well-suited for scripted functions because it allows for automated, passwordless access to remote systems. With this method, a public key is generated and stored on the server, and a corresponding private key is used on the client-side for authentication. Since there are no passwords involved, scripted processes can use the private key to authenticate securely without manual password entry.
802.1X
also known as IEEE 802.1X, is a network access control protocol that is used to provide authentication and authorization for devices trying to connect to a network, such as Wi-Fi networks. It ensures that only authorized and authenticated devices are allowed access to the network, making it a key component of Network Access Control (NAC) solutions. NAC helps organizations manage and secure network access by enforcing policies and controlling which devices can connect to the network.
Mandatory AC (MAC) uses labels and clearances.
Role-based AC (RBAC) uses roles.
Discretionary AC (DAC) uses access control lists.