- 67% of all attacks are identity-related, making identity security the single most important investment you can make right now.
- Unlike static RBAC, PBAC uses dynamic factors to evaluate every access request in real-time.
- Attackers can reach your Active Directory in just 3.4 hours after initial access. Meanwhile, 88% of ransomware is deployed after hours, making context-aware access non-negotiable.
- LastPass Business Max combines visibility, enterprise-grade SSO & MFA, and PBAC-ready policy enforcement in one platform, so you can discover unapproved AI and SaaS and govern access without deploying a patchwork of tools.
- Every unsanctioned app and integration your team brings into governance dramatically reduces your risk of becoming next year’s breach statistic.
67%.
That's the share of all cyber-attacks in 2025 caused by poor identity controls, according to the 2026 Sophos Active Adversary Report. That alarming statistic came from 661 incident response cases across 70 countries and 34 industries.
And that's where policy-based access control (PBAC) comes in. It evaluates every login request against dynamic policies so only the right people get in.
And it's the front-line defense you need in 2026.
But before we talk about PBAC, let's talk about what's driving the rise in identity based attacks.
What's driving the rise in identity based attacks?
Attackers have a favorite new tactic: shifting away from technical exploits to simply logging in, and it's driving the surge in identity based attacks.
Brute force activity now accounts for 15.6% of initial access methods, almost on par with direct exploitation at 16%.
The path of least resistance used to be finding a vulnerability in your perimeter. Now, it's finding your password — or buying it for a few dollars on the Dark Web — and walking right in.
And once they're in, they move fast. According to Sophos, attackers now reach Active Directory (the key to your entire business) in just 3.4 hours after initial access.
Meanwhile, 88% of ransomware payloads are deployed after-hours, and 79% of data exfiltration actions occur when no one's in the office.
That's the environment your business is facing right now. And it's exactly why it's so risky to control access through static roles, manual provisioning, and policies that don't evaluate context. The businesses that stay safe in 2026 aren't the ones with the biggest IT budgets. They're the ones who've made access control a front-line defense. And PBAC is how they're doing it.
What is policy-based access control (PBAC)?
Policy-based access control (PBAC) is an authorization model that grants or denies access based on real-time context.
It's often confused with RBAC (role-based access control), which relies on static or predefined permissions.
But while RBAC focuses on the user, PBAC focuses on the resource.
- RBAC asks, "What users do I have, and what can they do in my environment?"
- For PBAC, it's, "What resources do I have, and under what conditions can they be accessed?"
As an extension of ABAC (attribute-based access control), PBAC is more dynamic than RBAC. It uses a wide range of contextual factors like time, device, location, risk, and transaction value to determine access.
This enables access control that enforces least privilege more precisely, leading to stronger security and compliance. For example, a static policy can't tell the difference between your employee logging in at 9AM versus an attacker using that employee's stolen credentials at 2AM.
But PBAC can, and with attackers reaching critical systems in under 4 hours, real-time evaluation can mean the difference between a thwarted attack and closing your doors forever.
Did 2025 change everything and will 2026 be worse?
Yes, and the data makes a compelling case for why the worse may still be ahead.
The Sophos report found that MFA was missing or misconfigured in 59% of cases investigated. This means more than half of businesses hit last year didn't have basic access controls in place.
Sophos CISO and lead author of the report, John Shier warns that patch hygiene alone won't solve the access problem.
Add SaaS sprawl to the mix, and you now multiply the number of identities attackers can target.
SaaS apps, in particular, often lack consistent MFA support and lack unified lifecycle management.
That's a foundational problem, and PBAC solves it.
Now, let's talk about how this works.
How does policy-based access control (PBAC) work in 2026?
PBAC allows precise control over access rights and dynamic adjustment based on real-time data and the current threat landscape.
When a user tries to access a resource, PBAC references contextual factors, and grants or denies access based on those factors.
The PBAC workflow typically involves these steps:
- Access request. This is where users request access to resources.
- Policy evaluation. The request is intercepted by the PEP (Policy Enforcement Point), which forwards the request to the PDP (Policy Decision Point) for evaluation. The PDP references the PBAC policies on file and queries the PIP (Policy Information Point) if it needs more context to make a decision.
- An access decision. Finally, the PDP decides to permit or deny access. It sends its decision back to the PEP.
- Enforcement of the decision. The PEP enforces the PDP's decision.
- Visibility & analytics: All access attempts and decisions are logged to detect policy violations or anomalies.
This workflow frees your team from manual reviews and enables the "never trust, always verify" Zero Trust framework to protect your business from identity based attacks.
What are policies and rules in PBAC?
PBAC controls access through policies, which are rules that define what's allowed.
These policies are described in terms of:
- Subjects: Users requesting access
- Actions: The actions that can be performed on resources
- Objects: The resources being accessed
- Context: The conditions under which access is granted
Policies enable more granular control to reduce the risk of over-privileging.
As an example, contextual evaluation ensures access is only granted under certain conditions, such as time of day, role, risk score, or resource sensitivity.
PBAC also supports automated provisioning and deprovisioning. As employees leave their roles, access can be revoked automatically.
This reduces the risk of orphaned accounts and ensures a stronger security posture.
What are the three key strengths of PBAC?
PBAC's three core strengths are contextual control, scalability, and built-in compliance. And in 2026, all three are more critical than ever.
#1 Contextual, dynamic control means PBAC relies on contextual factors to grant access.
According to Cynet's Jan 2026 Cyber Threat Landscape report, attackers successfully hacked security training apps like OWASP Juice Shop, DVWA, and Hackazon because they were:
- Deployed with default passwords
- Left directly exposed to the internet
- Configured with excessive permissions
With PBAC, your users are verified based on who they are, what device they're using, when they're accessing a resource, why they need access, and where they're located during logins.
So, access isn't granted just because the account exists. It's granted only if your employees meet policy conditions right now and if their current role affords them access.
With dynamic, just-in-time access and centralized policy enforcement, PBAC delivers full identity lifecycle management.
It enforces conditional access that overrides even poor password hygiene, adding layers attackers can't easily bypass.
This means you're better positioned to block the identity based attacks that cause most breaches.
#2 Scalability across your business means PBAC is flexible enough to govern all systems and accommodate changes without added friction for users.
It's highly extensible, which means permissions can be added or removed to meet evolving business needs.
This flexibility is valuable if you want to expand into new markets or transition to a hybrid workforce. PBAC's context-aware rules can accommodate region-specific regulations, operational hours, and risk signals.
#3 Regulatory compliance means every access decision is logged.
According to Sophos's 2026 findings, missing logs have doubled year-over-year, with some firewalls defaulting to just seven days of retention.
This has left organizations unable to reconstruct attacks or maintain compliance after an incident.
PBAC solves this problem: It logs every access decision in real-time, with rich metadata such as employment status, time of access, resource sensitivity levels, and device posture.
This creates a persistent audit trail to meet compliance requirements, even if firewall logs expire.
What are some real-world scenarios of policy based access control in action?
In practice, PBAC helps block the exact identity based attacks that dominated headlines in 2025, and it does so by granting access based on context.
To understand PBAC in action, let's consider two real-world scenarios.
Healthcare
Hundreds of millions of healthcare records have been compromised since 2020, with 2023–2024 being the worst years on record.
In 2024, 180+ million healthcare records were exposed in more than 700 breaches.
And that's not all: Healthcare breaches are the most expensive ($7.42 million on average in 2025) and take the longest to contain (~279 days). The healthcare sector also sees the highest use of stolen credentials to deploy ransomware.
Here's where PBAC comes in.
In a hospital, each department requires access to different types of patient data.
PBAC ensures only doctors and care teams can access a patient's full medical records. This includes diagnoses, treatment plans, lab results, and medication charts.
A clinician's access is time-bound to their shift, scoped to their assigned facility, and tied to their device.
So, any access attempts that violate PBAC policies will be denied, and that denial will be logged and time stamped. This is likely how a member of staff at a London clinic was discovered accessing Princess Kate's medical records after her abdominal surgery.
Government
In what is known as the biggest supply chain hack of 2025, a threat actor called "rose87168" exfiltrated about 6 million records from Oracle Cloud's SSO and LDAP systems.
The data included JKS files, encrypted SSO passwords, hashed LDAP passwords, and enterprise manager JPS keys. Over 140,000 tenants were affected.
Given Oracle Cloud's customer base, this tenant population largely consisted of government agencies, defense contractors, manufacturers, and critical infrastructure organizations.
This is the key reason security experts warn about long-term unauthorized access from stolen credentials.
PBAC responds to this by ensuring that only personnel with the appropriate clearance levels can access resources.
Access can also be made conditional on the user's location, need-to-know designation, and possession of approved NDAs.
How does policy-based access control (PBAC) enhance data security?
Let's go back to our hospital. It wants to conduct a clinical trial to assess the potential benefits of semaglutide in the treatment of heart disease, Type II diabetes, and kidney disease.
PBAC policies can restrict access to clinical trial data based on a user's role, the phase of the trial, and data sensitivity.
Thus, only clinical trial sponsors (usually pharmaceutical companies or universities), researchers, the FDA, and participating healthcare providers can access proprietary drug data and patient info.
Patients or trial participants also have the right to their own clinical trial data. Ultimately, PBAC ensures compliance with HIPAA and GDPR rules on data privacy for all clinical trial stakeholders.
How do you implement PBAC successfully?
Best practices for PBAC implementation
Implementing PBAC successfully comes down to five non-negotiables.
But before you define a single policy, your first step is to assess your current exposure. You can't govern what you can't see.
This means you must take an inventory of every user, app, and integration before you write a single rule.
Curious about what apps your team is logging in to every morning, even the ones you didn't approve?
Surface all unmanaged apps and get clear visibility on who's using which apps with a Business Max trial. It won't cost a dime, and the intel is yours to keep, with zero obligation.
From there, these are the five best practices to implement PBAC:
- Use a centralized policy management system so everyone (IT & Dev, C-suite leaders, and staff) can align on security. When policies live in one place, they're easier to audit and update.
- Apply least privilege as a default. Users only receive the access they need at any given moment. This access is applied to every integration, AI and SaaS app, vendor account, and AI tool.
- Define clear attributes upfront. PBAC policies are crafted using user, resource, and environmental attributes, and the more precisely these attributes are defined, the more defensible each access decision becomes.
- Conduct regular reviews and incorporate user feedback. This helps your business adapt to changing regulations, threat environment, and business goals.
- Build time-bound access for contractors and vendors. Access that was granted for a project last quarter shouldn't still be active today. Build expiration dates into your policies, so permissions are revoked automatically.
What is the key consideration for integrating PBAC into existing systems?
The most important consideration is this: You don't have to replace your current tools or systems to start using PBAC.
Instead, take these practical steps:
- Review what you already have. This includes your identity providers (IdPs), SaaS apps, API connections, and legacy systems.
- Start where it matters most. Focus on the highest-risk and most sensitive environments first, such as payroll, accounting, and customer databases. Remember: You don't have to implement everything overnight. Integrate PBAC where it brings the most value and then expand incrementally.
- Blend PBAC with what's already working. If you already use RBAC ("Only payroll managers can view budget docs"), consider adding PBAC policies ("Only from 8:30AM to 5:00PM" and "Only from company devices"). Integrating with Identity-as-a-Service platforms like LastPass also helps create a unified identity & access management workflow.
- Pay attention to your SaaS stack. The average org uses more than 830 SaaS apps, with many of those outside IT oversight – Digital Journal. This means a majority of SaaS sits outside any sort of governance framework. Zero visibility into access attempts and whether they comply with regulatory requirements can undermine your PBAC deployment. To write meaningful policies, you need to know which apps your team is actually using, what resources each app contains, and what data they touch. Different apps carry different risk profiles. Knowing what's in use lets you prioritize which apps need stricter policies. Fortunately, you can scan for shadow or unmanaged apps with a free Business Max trial.
What are the common challenges and solutions in PBAC implementation?
Although PBAC has many advantages, its implementation may be anything but simple. Below, you'll see three roadblocks and their solutions:
-
Resistance to change. Many employees balk at new policies due to fear of the unknown. They reach for tools that are familiar and seem to work faster and easier than what IT approved. PBAC policies that ignore this trend will generate workarounds, not compliance.
Solution: Frame change as a business upgrade, where PBAC gets them faster access and fewer password resets. And create accessible channels where employees can request the tools they need.
-
Policy conflicts. Do your new PBAC policies contradict your current rules? Conflicting policies can lead to denied access for legitimate users.
Solution: Implement regular audits for policy analysis and conflict detection before deploying PBAC.
-
Admin burdens. Layering PBAC on top of current processes takes time, skilled personnel, and the right tools. If your business lacks all three, adoption can be a challenge.
Solution: Version control reduces outage risks from misconfigurations and supports rollback to a stable version in minutes.
ABAC versus PBAC: Is PBAC superior?
The answer is no. Both ABAC and PBAC work together.
But as SaaS usage spikes and identity based attacks rise, PBAC is getting more attention.
Here's why: Although ABAC can factor in attributes for access control, its rules can't be written in normal prose.
Instead, they must be written in eXtensible Access Control Markup Language (XACML), an XML-based language.
Writing in XACML requires a deep understanding of XML schema, attribute categories, and functions — a challenge if you have no prior expertise.
When time is of the essence during an attack, the longer it takes to change permissions and isolate the threat, the more data can be exfiltrated.
With PBAC, you can write policies in human-readable language and deploy them quickly.
And here's another critical distinction: ABAC focuses on inputs such as user attributes and resource metadata. It answers the question: What facts are available at decision time and should access be granted?
Meanwhile, PBAC excels at governance and control. It answers a different question: Who controls access rules, and are they consistently applied?
Essentially, ABAC introduces context into decisions, while PBAC governs the entire decision process. Together, they cover both the precision and control modern identity security demands.
Does my business really need policy based access control?
Now, you may be thinking, "That's great, but do I really need PBAC?"
Good question.
Dedicated PBAC platforms are powerful tools. For example, Stitchflow provide an enforcement automation layer for non-SCIM apps.
Meanwhile, others like SafePaas deliver enterprise-grade governance with ERP and compliance depth for Fortune 500 and global enterprises.
However, these PBAC platforms don't protect you from identity-based risks like employees logging into unvetted apps, reusing weak passwords, and leaving with access permissions intact.
Platforms like SafePaas also assume you already have a high level of SaaS visibility. They govern what you've already integrated.
For many businesses, PBAC may be the wrong starting point.
Before you can govern access with policies, you need to know what you're governing.
LastPass Business Max gives you full visibility into SaaS usage across your organization, so you can see what tools actually exist in your environment.
It isn't the same as an enterprise PBAC platform.
But if you're a lean team on a tight budget operating in an environment where identity-based attacks are surging, it delivers what actually matters: Visibility into shadow SaaS and the controls to act on it — without writing a single line of code or hiring more staff.
Sometimes, the right tool isn't the most sophisticated one. It's the one that actually solves your most urgent problem.
To see how Business Max works, book a demo, or try it yourself with a Business Max trial.



