In RAdAC, access privileges are granted based on a combination of a user’s identity, mission need, and the level of security risk that exists between the system being accessed and a user. RAdAC will use security metrics, such as the strength of the authentication method, the level of assurance of the session connection between the system and a user, and the physical location of a user, to make its risk determination.
Source(s):
NIST SP 800-95
under Risk-Adaptive Access Control (RAdAC)
from
TAT-06284
A form of access control that uses an authorization policy that takes into account operational need, risk, and heuristics.
Source(s):
CNSSI 4009-2015
under risk adaptable access control (RAdAC)
Access privileges are granted based on a combination of a user’s identity, mission need, and the level of security risk that exists between the system being accessed and a user. RAdAC will use security metrics, such as the strength of the authentication method, the level of assurance of the session connection between the system and a user, and the physical location of a user, to make its risk determination.
Source(s):
NIST SP 800-160 Vol. 2 Rev. 1
under risk-adaptive access control
from
NIST SP 800-95