16 min read
Discretionary Access Control (DAC) is a decentralized model where the resource owner determines who can access it and what level of access they have. In this approach, the subject controlling a file, document, or system object can grant or revoke permissions, share it with others, and even define attributes for newly created objects, all without requiring central administrator approval. Practical examples of DAC appear in tools like Google Docs, where you decide who can view or edit a document, in smartphone applications, and in common operating systems.
Unlike Mandatory Access Control (MAC), which enforces strict policies through a central authority, Discretionary Access Control (DAC) gives resource owners flexibility and autonomy. In DAC systems, subjects can share information, grant privileges, modify object attributes, or define attributes for new objects, all without central authorization. This allows quick adjustments and different forms of access control that are generally not possible in MAC. While MAC sets policies centrally via clearance levels, DAC lets object owners decide who can access and modify their resources. The trade-off, however, is that such freedom can create security risks if permissions are not carefully managed.
A 2025 market analysis shows that while Role-Based Access Control (RBAC) leads the access control market, Discretionary Access Control (DAC) is a favorite among environments where teamwork and flexibility matter. It’s especially common among small and mid-size organizations and makes up a big part of the USD 12.01 billion global access control market, which is expected to reach USD 25.15 billion by 2034. This mix of autonomy and flexibility is why DAC works so well for user-driven collaboration. Up next, we’ll look at how it works, where it shines, where it can pose risks, and how it stacks up against more rigid models like MAC.
Key Takeaways:
In Discretionary Access Control (DAC), the security model allows the resource owner to define who can access the resource and specify the actions they are permitted to take, such as read, write, or execute. Control over these permissions is generally maintained through access control lists (ACLs) or configured within application settings. To see how DAC compares with another model, check out our MAC vs DAC comparison guide.
DAC operates on the principle that the resource owner has full discretion over who is granted access. First introduced in the Orange Book by the Trusted Computer System Evaluation Criteria (TCSEC), DAC is widely implemented in operating systems and network resources. Most discretionary access control examples incorporate accountability features, such as logging user access and tracking resource modifications. Overall, DAC provides granular control over access to sensitive information, helping safeguard critical data from unauthorized individuals. You can perform the following types of discretionary access control:
In Discretionary Access Control (DAC), the resource owner, whether it’s a file, folder, or database, decides who can access the resource and what actions they are allowed to perform. When a user requests access, the system validates their credentials (such as a username, password, or cryptographic keys) to confirm identity and then grants the appropriate permissions defined by the owner. Because control is “discretionary” the owner can grant, adjust, or revoke permissions at any time, determining not only who can access the resource but also the extent of their privileges, such as read, write, modify, or share. This makes DAC highly flexible and user-driven, though it also introduces potential security risks since protection largely depends on how carefully owners manage and distribute credentials.
For example, in personal computer operating systems, file access can be limited by granting certain privileges to specific users. These rights often include Read (R), which allows you to examine a resource without making any changes; Write (W), which allows you to create or edit material; and Execute (X), which allows you to run files, programs, or applications. To observe DAC in action, it's necessary to understand how such rights are granted and maintained.
A practical example of DAC is Google Docs sharing, in which the document author determines who may access, comment on, or change the file, or Unix chmod commands, in which the file owner grants read, write, and execute rights to certain users or groups. In both circumstances, the resource owner has complete discretion over granting or denying access at any time.
When it comes to managing who can access specific resources, discretionary access control provides a range of advantages worth considering.
While every access control model has its strengths and limitations, DAC stands out for balancing usability with control. Its design makes it easier for resource owners to manage access without heavy administrative effort, offering practical advantages such as:
1. Flexibility: With DAC, users may specify rights for specific items. Object owners can divide users into groups, allowing for more precise control over access settings, and mandatory access control systems do not allow for this.
2. Speed and efficiency: Discretionary controls allow data to flow freely over networks. Users can provide access to objects by clicking a button. There is no need to build complicated user profiles or clearance levels for new personnel.
3. Low burden on administration: Decentralization means that object owners govern access, which reduces administrative burden. Administrators are not required to manage access control profiles for each user and each resource. Instead, consumers decide how they want to obtain information when they need it.
4. Simple policy management: administrators only need to provide users with object access rights. Discretionary access technology is very easy to utilize with the correct ACL management solutions.
When speed and ease of use are top concerns, these advantages make a discretionary security system alluring. Smaller businesses or organizations that handle less sensitive data are frequently a suitable fit for DAC.
Discretionary access control has drawbacks despite its advantages. These are the key points to remember.
1. Security: Above all, it is acknowledged that mandatory access control is more secure than DAC. Attackers may use discretionary access to infect target access points with malware. Users may be given undue access due to privilege creep. Users may provide too much access. Or they could not be aware of what they are consenting to.
2. Absence of visibility: Decentralization may result in a lack of administrative visibility and confusion. Security personnel must be aware of who is using private resources. Discretionary controls can result in security flaws and problems with compliance since they are difficult to monitor and manage.
3. Maintenance: Object owners are responsible for keeping ACLs up to current and relevant. As ACLs and networks develop, they may lose effectiveness. For example, access control lists may include access privileges for former workers. Alternatively, it may fail to update with user roles.
MAC and DAC handle security, flexibility, and user control in different ways. Knowing these differences helps you choose the model that best fits your company’s needs.
Feature | DAC | MAC |
---|---|---|
Control | Access is managed by the resource owner, who decides who can view, edit, or execute the resource. | Access control is managed and enforced by system administrators and the operating system. |
Flexibility | Highly flexible, allowing owners to grant, modify, or revoke permissions at any time. | Very limited flexibility, as permissions are fixed according to strict security classifications. |
Security | Provides low security, with risk depending on how carefully the owner manages access. | Provides very high security, as policies are centrally controlled and difficult to bypass. |
Use Case | Works best for environments that prioritize collaboration and general office work. | Works best for sectors like government, military, or regulated industries where strict control is essential. |
Example | In Google Docs, the file owner can choose who to share the document with and decide whether they can view, comment, or edit it, giving the owner direct control over access. | In a military clearance system, access to classified documents is based on security clearance levels. For example, only personnel with “Top Secret” clearance can open certain files, regardless of who created them. |
DAC is a common feature in both consumer and enterprise applications. In many cases, users interact with discretionary access systems without even realizing it. Here are some practical examples:
While discretionary access control isn’t ideal for organizations handling extremely sensitive or regulated data, it works well in environments where collaboration, speed, and adaptability matter more than rigid security rules. Its ability to let resource owners control permissions on the fly makes it practical for smaller or less-regulated setups.
Discretionary Access Control (DAC) offers flexibility, granting resource owners the ability to manage permissions directly, but it should not stand alone. In the modern DAC cybersecurity landscape, DAC must be integrated into Identity Governance and Administration (IGA) and IAM systems to deliver both usability and governance.
Discretionary Access Control is widely used for its flexibility, speed, and user-driven nature, making it ideal for agile environments like small teams and research groups. However, to avoid security risks, it should be balanced with governance by integrating it into IAM/IGA frameworks, supplementing with RBAC, and conducting regular access reviews.
At Tech Prescient, we help businesses design and implement access control strategies that balance collaboration with compliance, so you can share confidently without compromising security.
Get the right access to the right people, every time.
Talk to our access control experts and see how DAC can work for your organization:
1. What is discretionary access control in cybersecurity?
Discretionary Access Control (DAC) is a model where the owner of the data decides who gets access and what they can do with it, like read, edit, or share. Think of it as giving someone the keys to your room because it’s your room, and you decide the rules.2. How does DAC differ from MAC and RBAC?
The difference lies in who makes the decisions. In DAC, the data owner controls permissions. In Mandatory Access Control (MAC), the system or a central authority sets the rules, and no one can override them. Role-Based Access Control (RBAC) assigns access based on predefined job roles, so permissions change automatically when a person’s role changes.3. Is DAC a secure model for sensitive data?
Not always. While DAC offers flexibility, it can also cause accidental over-permissioning, where users get more access than they actually need. That’s why it’s usually better for less sensitive environments or used alongside stricter access control models.4. What are some real-world examples of DAC?
You’ve probably used DAC without realizing it. When you share a Google Doc and choose who can view or edit it, that’s DAC in action. The same goes for smartphone app permission prompts or Unix/Linux file commands like chmod and chown.5. Can DAC be combined with other access control methods?
Yes, and that’s often the best approach. Many organizations pair DAC with IAM systems or RBAC to balance flexibility with governance, ensuring that permissions are both user-friendly and compliant with security policies.