Mandatory Access Control


Mandatory Access Control (MAC) is a security strategy used in information technology that restricts the ability of users to access, manipulate, or view information based on their rank or clearance level. This strategy is mandatory because it’s enforced by the system itself, rather than being left to the discretion of the user. It is often used in governmental or military systems to ensure sensitive information remains secure.


The phonetic pronunciation of “Mandatory Access Control” is:Man-duh-tohr-ee Ak-ses Kuh n-trohl

Key Takeaways

  1. Enhanced Security: Mandatory Access Control (MAC) provides high levels of security as it controls the ability of users and systems to access certain information or systems based on predetermined security policies.
  2. Non-Discretionary: In MAC, the ability to access information does not lie in the discretion of the subject or user. The access privileges are predefined and cannot be altered by the user making it highly secure and devoid of internal malicious threats.
  3. Complexity: While MAC provides high security, it comes with heightened complexity due to the necessity of predetermining the access classification and clearance of every user and every piece of information.


Mandatory Access Control (MAC) is a crucial term in technology because it defines a security strategy employed to restrict the permission levels a user or a process has over certain resources. It’s particularly important in environments where data security is a high priority, such as government or military applications. In a MAC model, access to system resources is restricted based on the classification or labeling of information and the security clearances given to users or systems. This model significantly minimizes the risk of unauthorized access to critical data, enhancing overall system security. Therefore, understanding and implementing MAC is invaluable in bolstering system security and ensuring sensitive data is accessed only by authorized users.


Mandatory Access Control (MAC) is a crucial component used in the field of Information Technology for heightening system security and maintaining order in how data access should be structured. The primary purpose of this security strategy is to restrict the ability of users and processes to access or perform operations on system objects (like files, system settings, etc.), unless explicit permissions have been granted. In this model, the system itself, not the user, manages the access control policies, which means unauthorised or unnecessary information access is strictly curbed, ensuring a more secure operating environment. MAC is chiefly used in environments where information sensitivity and confidentiality is of utmost importance, such as in military systems or financial institutions. Operating based on a “need-to-know” principle, it allows the system administrators to define comprehensive access control policies according to the specific security needs of the organization. Only authorised users are given the necessary permissions based on their role or task at hand. For those users, MAC ensures they only have the minimum privileges necessary to complete their tasks, in order to limit potential system security risks. Additionally, it helps prevent data leakage, blocks malware intrusion attempts, and assists in regulatory compliance.


1. Military Information Systems: Mandatory Access Control (MAC) is heavily utilized in military settings to protect classified or sensitive information. Each data object (a file, for instance) is assigned a classification (Top Secret, Secret, Confidential, etc.), and each user is granted a clearance level. Access is only granted if the user’s clearance level is equal to or higher than the object’s classification level. For example, only a user with a “Confidential” clearance level or higher would be able to access a “Confidential” file.2. Healthcare Systems: In healthcare, patient data is highly sensitive, and access control is essential to maintain privacy and confidentiality. MAC can be implemented to define rules based on the role of a user. For example, children’s medical records may only be accessed by authorized doctors or families, not all hospital staff. 3. Financial Institutions: Banks, insurance companies, and other financial institutions also utilize MAC. Information about clients, their accounts, and transactions are sensitive and should only be accessed by authorized personnel. Moreover, each personnel’s access may be further restricted based on their role (e.g., customer service representatives might only have read access while managers might have read-write access).

Frequently Asked Questions(FAQ)

**Q1: What is Mandatory Access Control (MAC)?****A1:** Mandatory Access Control (MAC) is a security model that restricts access to information based on the level of authorization assigned to a user and the classification of the information itself. Each piece of information is labeled with classification levels, and only users with a sufficient level of clearance can access it. **Q2: How does Mandatory Access Control differ from other access control models?****A2:** In contrast to Discretionary Access Control (DAC), where owners of information set access rules, MAC does not allow owners to determine access rules. The policies are set by a central authority in the organization. In a Role-Based Access Control (RBAC) system, access is based on the user’s role within the organization, whereas MAC uses security levels or classifications of both the user and the data.**Q3: What is the purpose of using Mandatory Access Control?****A3:** The main purpose of MAC is to protect the confidentiality and integrity of information. It prevents unauthorized users from accessing or modifying data, thereby reducing the risk of data leaks or damage.**Q4: In what kind of environments or applications is Mandatory Access Control commonly used?****A4:** MAC is commonly used in environments where data security is paramount, such as military systems or government institutions. It is also used in systems dealing with confidential corporate data and other sensitive information.**Q5: What are the downsides to Mandatory Access Control?****A5:** While MAC provides enhanced data protection, it can be more complex and rigid compared to other forms of access control. It requires more effort to set up because of its comprehensive classification and labeling system. It might also be seen as overly restrictive or difficult to manage in less formal or smaller work environments.**Q6: Are there different types of Mandatory Access Control?****A6:** Yes, there are several models of MAC, such as Bell-LaPadula Model supporting confidentiality, and Biba Model supporting integrity. Each model has different mechanisms for enforcing access control rules based on different policies. **Q7: How does Mandatory Access Control prevent unauthorized access?****A7:** MAC prevents unauthorized access by enforcing policies that restrict access to an object (like a file) based on the security clearance of the user and the classification or labeling of the object. The access decisions are mandatory and not left to the discretion of the user.

Related Tech Terms

  • Security Labels
  • Access Policy
  • Discretionary Access Control
  • Role-Based Access Control
  • Access Control List

Sources for More Information


About The Authors

The DevX Technology Glossary is reviewed by technology experts and writers from our community. Terms and definitions continue to go under updates to stay relevant and up-to-date. These experts help us maintain the almost 10,000+ technology terms on DevX. Our reviewers have a strong technical background in software development, engineering, and startup businesses. They are experts with real-world experience working in the tech industry and academia.

See our full expert review panel.

These experts include:


About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.

More Technology Terms

Technology Glossary

Table of Contents