Domain 1: General Security ConceptsDomain 4: Security Operations9 min read

How to Solve Access Control PBQs on Security+

Access control PBQs test your ability to configure user permissions, implement role-based access control (RBAC), and apply the principle of least privilege. This guide teaches you how to build permission matrices that meet security requirements.

Interactive simulation — no account required

What Is an Access Control PBQ?

Access control PBQs present you with a scenario describing job roles, data sensitivity levels, and security requirements, then ask you to configure who can access what. You'll typically work with a matrix or permission interface where you assign access rights based on roles or individual users.

These questions test whether you can translate security policies into practical access configurations. You might be asked to:

  • Build a role-based access control (RBAC) matrix from job descriptions
  • Identify over-permissioned accounts that violate least privilege
  • Configure file or folder permissions based on department needs
  • Implement separation of duties by restricting conflicting permissions
  • Troubleshoot why a user can or cannot access a resource

Least Privilege is the Foundation

Every access control question centers on one principle: users should have the minimum permissions necessary to perform their job—nothing more. If someone doesn't need access, they shouldn't have it. Excessive permissions are always the wrong answer.

The 4-Step Method for Access Control PBQs

Approach permission configuration systematically:

1
Identify the roles. Read the scenario and list every job role mentioned: HR Manager, Developer, Auditor, System Admin. Each role should have a distinct permission set based on their job responsibilities.
2
Identify the resources. List every resource that needs protection: employee records, financial data, source code, system configurations. Understand the sensitivity level of each.
3
Map minimum required access. For each role, determine the minimum access needed. HR needs employee records but not source code. Developers need code but not financial data. Start with no access and add only what's explicitly required.
4
Check for conflicts. Look for separation of duties requirements. Can one person both request and approve purchases? Can a developer push code directly to production? Conflicting permissions should be split across roles.

Access Control Models

The exam tests different access control models. Know how each works:

Role-Based (RBAC)

Permissions assigned to roles, users assigned to roles. Most common in enterprises.

User → Role (HR Manager) → Permissions (Read employee records)

Discretionary (DAC)

Resource owners control access. The owner decides who can access their files.

File owner grants read access to specific users

Mandatory (MAC)

System-enforced based on security labels. Used in government/military.

TOP SECRET file can only be read by TOP SECRET cleared users

Attribute-Based (ABAC)

Access based on attributes: user department, time of day, location, device type.

IF department=Finance AND time=BusinessHours THEN allow

Walkthrough: Building an RBAC Matrix

A company has three departments and needs access configured for their shared file server. Configure the permission matrix to meet all business requirements while following least privilege:

Role-Based Access Control MatrixConfigure permissions following least privilege

Business Requirements

HR:Must access employee records. Must not access financial or development files.
Finance:Must access financial reports. Must access employee records for payroll processing.
Development:Must access source code repository. Must not access HR or financial files.
Auditors:Must have read-only access to all departments for compliance review.
IT Admin:Must manage permissions but not read sensitive file contents.
Role
/HR/
/Finance/
/Development/
H
HR Staff
Read/WriteNo AccessNo Access
F
Finance Staff
ReadRead/WriteNo Access
D
Developers
No AccessNo AccessRead/Write
A
Auditors
ReadReadRead
I
IT Admin
Modify ACLModify ACLModify ACL
Permissions:
No Access
Read
Read/Write
Full Control

Analysis

HR Staff: Read/Write to /HR/ for managing employee records. No access to Finance or Development—they have no business need for this data.

Finance Staff: Read/Write to /Finance/ for financial operations. Read-only to /HR/ because payroll requires viewing (not modifying) employee salary data. No access to Development.

Developers: Read/Write to /Development/ for code management. No access to HR or Finance—sensitive business data is completely isolated from engineering.

Auditors: Read-only across all folders. This allows compliance review without any risk of data modification. Auditors can verify but cannot change.

IT Admin: "Modify ACL" permission only—can change who has access, but cannot read file contents. This is separation of duties: admins manage access but can't exploit it to view sensitive data.

Key insight: Finance getting Read (not Read/Write) access to HR demonstrates least privilege—they need to view salary info for payroll but have no business reason to modify employee records.

Practice Access Control Configuration

Build RBAC matrices and configure permissions in interactive scenarios.

Permission Levels

Understand the standard permission levels you'll see in PBQs:

No Access — Cannot see or interact with the resource at all. This is the default for least privilege.

Read — Can view contents but not modify. Appropriate for reference data or audit access.

Read/Write — Can view and modify contents. Standard access for data owners.

Read/Write/Delete — Can view, modify, and remove. Usually restricted to data managers.

Full Control — All permissions including the ability to change permissions. Reserved for administrators.

When configuring access, always start from "No Access" and add only what's required. Never grant Full Control unless the role specifically needs to manage permissions.

Separation of Duties Patterns

These role separations frequently appear in PBQs:

  • Request vs. Approve — The person who requests a purchase shouldn't approve it. Prevents self-dealing.
  • Develop vs. Deploy — Developers write code, but a separate team pushes to production. Prevents unauthorized changes.
  • Create vs. Audit — Those who create financial entries shouldn't audit them. Prevents fraud concealment.
  • Admin Access vs. Data Access — IT admins manage systems but shouldn't read sensitive business data. Prevents insider threats.
  • Key Custodian vs. Key User — The person who manages encryption keys shouldn't use them for encryption. Prevents key abuse.
  • Physical vs. Logical Access — Data center physical access and system admin access should be different people. Defense in depth.

Common Access Control Mistakes

Watch for these errors that violate security principles:

Group membership creep — User accumulates permissions from multiple role changes. Former HR employee now in IT still has HR access.

Excessive inherited permissions — Adding user to "Domain Admins" when they only needed one specific permission.

Shared accounts — Multiple users sharing one login. Destroys accountability and audit trails.

No access reviews — Permissions granted years ago never reviewed. Former contractors still have access.

Emergency access not revoked — Temporary elevated access for incident response never removed.

All users in same group — Flat permission structure where everyone has the same access. No segmentation.

Frequently Asked Questions

What is an access control PBQ on the Security+ exam?

An access control PBQ presents you with job roles and security requirements, then asks you to configure who can access what resources. You might build an RBAC matrix, identify over-permissioned accounts, or troubleshoot permission issues. The focus is on applying least privilege and separation of duties.

What is the principle of least privilege?

Least privilege means giving users the minimum permissions necessary to perform their job—nothing more. A payroll clerk needs access to salary data but not engineering systems. By limiting access, you reduce the damage from compromised accounts and insider threats.

What is separation of duties?

Separation of duties divides critical tasks between multiple people so no single person can complete a sensitive action alone. For example, one person requests a payment and a different person approves it. This prevents fraud and catches errors.

What's the difference between RBAC and ABAC?

RBAC (Role-Based Access Control) assigns permissions to roles, then assigns users to roles. A user's access is determined by their role membership. ABAC (Attribute-Based Access Control) makes access decisions based on attributes like department, time, location, or device—offering more granular, context-aware control.

Practice What You've Learned

Apply these concepts with an interactive Access Control simulation.