Jump to content

Risk Adaptive (Adaptable) Access Control

From Hackerpedia
Revision as of 02:53, 15 January 2026 by imported>Unknown user

Languages: English | Français

Risk Adaptive (Adaptable) Access Control

In RAdAC, access privileges are granted based on a combination of a user’s identity, mission need, and the level of security risk that exists between the system being accessed and a user. RAdAC will use security metrics, such as the strength of the authentication method, the level of assurance of the session connection between the system and a user, and the physical location of a user, to make its risk determination.


Source: NIST SP 800-95 | Category: