# Implement policy-based access control (PBAC)
# What is PBAC?
# Why introduce PBAC?
From the perspective of time, the commonly used access control management solutions include access control list (ACL), role-based access control (RBAC) and attribute-based access control (ABAC). The expression and execution capabilities of ACL are weak, and RBAC The expressive ability of PBAC is lacking. It can only express forward access control. Reverse control is more difficult. ABAC can express reverse access control better, but its execution ability is poor. PBAC is the best access now and in the future. Control scheme, because PBAC combines the best features of RBAC and ABAC, it can achieve more complex and flexible management and control requirements in more application scenarios. Of course, there is no need to apply PBAC to access control in simple scenarios, because it is a sledgehammer.
If you want to know more about PBAC, you can read this article: Zero Trust Security Architecture Concept and One of the Landing Plan (opens new window)