System Design Space
Knowledge graphSettings

Updated: March 24, 2026 at 3:10 PM

Rights management approaches: ACL, RBAC, ABAC, ReBAC

medium

Practical analysis of ACL/RBAC/ABAC/ReBAC: how access decisions are made, canonical schemes, comparison of trade-offs and limits of applicability.

An access-control model should not be chosen by whichever acronym sounds more modern, but by how roles, resources, context, and relationships actually work in the product.

The chapter compares ACL, RBAC, ABAC, and ReBAC as different ways to make access decisions and shows how each one changes policy expressiveness, explainability, operational cost, and long-term system growth.

For design reviews, it is strong material for discussing access policy as part of the domain model rather than as a technical add-on that can be swapped out later without consequences.

Practical value of this chapter

Design in practice

Use guidance on ACL/RBAC/ABAC/ReBAC access-control models and their fit to define architectural security requirements before implementation starts.

Decision quality

Validate solutions through threat model, security invariants, and production control operability, not compliance checklists alone.

Interview articulation

Frame answers as threat -> control -> residual risk, linking business scenario to concrete protection mechanisms.

Trade-off framing

Make trade-offs explicit for ACL/RBAC/ABAC/ReBAC access-control models and their fit: UX friction, latency overhead, operational cost, and compliance constraints.

Primary

Zanzibar: Google's Consistent, Global Authorization System

The canonical source about ReBAC on a global scale and the tuple relationship model.

Open report
ACLRBACABACReBAC

The authorization model determines how exactly the system makes the access decision. In practice, teams combine several approaches: RBAC as a base layer, ABAC for context and exceptions, ReBAC for graph-shaped collaboration, ACL as a local mechanism at the object level.

Canonical visualization of models

ACL

Rights are stored next to the resource as a list of subjects and permissions.

Requesteruser:aliceTarget resource/docs/spec-v3ACL attached to resourcealice → read, commentteam:security → read, writebob → readservice:ci-bot → writedefault → denyinherit parent ACL = falseif (subject ∈ ACL)allow actionpermit/deny

Comparison of models

CriterionACLRBACABACReBAC
Unit of PolicyEntry per resourceRoleRuleRelation in the graph
GranularityVery accurate, but localAverageHighHigh on the graph
Access changesExpensive on larger setsCheap via role mappingVia Policy/AttributesThrough new relation tuples
ExplainabilityHighHighAverageMedium, need explain API
Platform complexityLowLow-mediumMedium-highHigh
Typical scaleLocal systemsEnterprise/B2BRegulated domainsCollaboration at scale

ABAC

NIST SP 800-162

Practical recommendations on the policy model and attributes for ABAC.

Open document

Limits of applicability

ACL

When suitable: Object storage, file systems, small isolated domains with an explicit owner rule.

Where does it start to hurt: Large multi-tenant systems: mass rights changes are too expensive.

Border: Use it as an edge model next to a resource, but not as a single global policy for the entire company.

RBAC

When suitable: Internal platforms, B2B SaaS, mature org structures with clear job functions.

Where does it start to hurt: Contextual decisions (geo/time/risk) and object exceptions per item.

Border: Basic model for most systems. Strengthen with ABAC predicates or ACL exceptions.

ABAC

When suitable: Domains with compliance: finance, healthcare, govtech, where context and data classification are important.

Where does it start to hurt: Teams without governance for attributes and without a testable policy lifecycle.

Border: We need a strict dictionary of attributes, audit policy changes and tools to explain/trace solutions.

ReBAC (Zanzibar)

When suitable: Collaborative products: documents, repositories, workspaces, complex shared graphs.

Where does it start to hurt: Small systems where the relationship graph does not justify the infrastructural complexity.

Border: Justified when there are a large number of relationship checks and the need for a consistent global AuthZ service.

In 2026, a typical production approach: RBAC as a framework, ABAC as context conditions, ReBAC for shared objects, ACL as local override on a resource.

Access policy lifecycle controls

StageMandatory controlsFailure action
Policy designUnified resource/action dictionary, owner for each policy zone, policy-as-code with code review.Block policy merge without an owner and tests, and return the change to the team backlog.
Distribution and versioningVersioned policy bundles, canary rollout, signed artifacts and runtime integrity verification.Stop rollout and automatically rollback to the last stable policy version.
Decision pathFail-closed on critical endpoints, deny-by-default, object-level checks for sensitive operations.Disable risky operations and raise a high-priority alert for the on-call engineer.
Review and recertificationScheduled access reviews, role recertification, and orphan-access detection after org changes.Automatically mark access as temporary and initiate revoke until owner confirmation.
Emergency revokeUnified break-glass process, mass revoke for tokens/relations, impact verification via audit trail.Switch the system to a restricted mode and force-close high-risk active sessions.

Authorization operational metrics

P95 authorization check latency

Target: <= 20 ms

When checks are slow, teams bypass the policy layer and lose consistency of access control.

Share of decisions with explain trace

Target: >= 99%

Required for incident investigations and clear user-facing answers on permit/deny decisions.

MTTR for policy rollback

Target: < 10 minutes

Fast rollback is critical when a new policy breaks production traffic or legitimate access.

Expired accesses after offboarding

Target: 0

Shows identity lifecycle maturity and reduces the risk of unauthorized former-user access.

Object-level check coverage on high-risk API

Target: 100%

Without object-level enforcement, BOLA/IDOR risk remains even with formally correct AuthN.

Access model rollout roadmap

1

Phase 1 (0-30 days)

Focus: Access and critical-resource inventory

Outcome: A map of subjects, roles, resources and current exceptions with assigned owners.

2

Phase 2 (30-60 days)

Focus: RBAC baseline and deny-by-default

Outcome: Unified role catalog, centralized policy-check middleware and baseline decision audit logs.

3

Phase 3 (60-90 days)

Focus: Context rules and relation graph

Outcome: ABAC predicates for risk/context, ReBAC for shared objects and explain API for access debugging.

4

Phase 4 (90+ days)

Focus: Governance and continuous verification

Outcome: Regular access reviews, policy quality gates in CI/CD and measurable SLOs for the authorization platform.

Typical antipatterns

Make one 'god-role admin' and try to close all access scenarios with it.

Mix business attributes and security attributes without owner and without data contract.

Build ReBAC without explainability: users do not understand why access is available or not.

Leave rights after org changes (offboarding/role change) without automatic revoke.

References

Related chapters

Enable tracking in Settings