ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question
You are designing a multitenant RESTful API where each object (such as an uploaded document) can have its own unique list of users authorized to read or modify it. Because the set of permitted users differs from object to object, a role-centric approach will not work. Which authorization mechanism is the most appropriate choice for enforcing these fine-grained, per-object permissions?
Attribute-based access control using environment attributes only
Mandatory access control enforced by security labels and clearances
Role-based access control with static role-to-permission mappings
Access control lists that associate specific subjects with permitted operations on each resource
Access control lists (ACLs) are designed to tie specific subjects (users or groups) directly to specific objects and enumerate the exact operations (read, write, execute, etc.) each subject may perform on that object. This makes ACLs well suited to environments where authorization decisions must vary at the individual resource level, such as assigning different user permissions to each document in a multitenant application.
Role-based access control relies on predefined roles mapped to permissions, so it is less flexible when the set of authorized users changes for every object. Attribute-based access control could meet the requirement only if subject and object attributes were leveraged-not just environment attributes alone-so using environment attributes exclusively would be insufficient. Mandatory access control focuses on fixed security labels and clearances administered centrally and is typically too rigid for dynamic, object-specific sharing needs. Therefore, an ACL provides the most straightforward and appropriate mechanism in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Access Control List (ACL)?
Open an interactive chat with Bash
How does ACL differ from Role-Based Access Control (RBAC)?
Open an interactive chat with Bash
Why is Attribute-Based Access Control (ABAC) not suitable in this scenario?
Open an interactive chat with Bash
ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Concepts
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .