Defines what an authenticated person can do with that data. e.g. user roles, or permissions
Network Access Control (NAC) * Create policies for what individual systems can do on the network.
Access Control List (ACL) * Clearly defined list of permissions a user has on a system * ACL access models: + Mandatory Access Control (MAC) Every resource is assigned a label that defines its security level. + Discretionary Access Control (DAC) Based on the idea that a resource has an owner who may at their discretion assign access to that resource. + Role-Based Access Control (RBAC) - Most popular - Users are placed in groups and groups have different access to things.