YOU MIGHT ALSO LIKE
ASSOCIATED TAGS
access  accounting  authentication  authorization  compliance  compromised  control  employees  identity  logging  permissions  records  security  simple  systems  
LATEST POSTS

What Are the 3 A's in Security? Understanding Authentication, Authorization, and Accounting

We tend to think of security as firewalls and encryption. But the real weak link? Always human logic. Or the lack of it. That’s where the 3 A’s become less of a checklist and more of a litmus test for how seriously a system treats trust.

How the 3 A's Shape Access Control in Modern Systems

Let’s start with the basics. These aren’t just buzzwords you toss into a compliance report. They form a sequence—each one depending on the other, like links in a chain. If one breaks, the others become liabilities. Take a hospital’s electronic records system: the doctor must first prove identity (authentication), then be granted access to patient files based on their role (authorization), and finally, every action they take—viewing, editing, printing—is logged (accounting). Miss any step, and you’re gambling with HIPAA compliance and patient safety.

And that’s just one sector. In finance, a delay in accounting logs once led to a $40 million fraud going undetected for 9 months at a mid-sized bank in Zurich. The authentication was solid. Authorization rules were tight. But the logging system was set to batch-process entries every 6 hours. That changes everything. Real-time monitoring wasn’t prioritized because “it worked most of the time.” Spoiler: most of the time isn’t enough.

Authentication: Proving Identity in a World of Imposters

Authentication answers a single question: Are you who you claim to be? That sounds simple until you consider that over 80% of data breaches in 2023 involved compromised credentials—mostly passwords. A password is something you know. A fingerprint is something you are. A security key is something you have. Multifactor authentication (MFA) combines at least two of these to reduce risk.

But—and this is where people don’t think about this enough—not all MFA is equal. SMS-based codes, still used by 60% of businesses, can be hijacked through SIM-swapping. Push notifications can be fat-fingered. The strongest method? FIDO2 security keys. Google hasn’t had a single successful phishing breach since mandating them for all employees in 2018. That’s five years, zero incidents. Yet adoption remains under 15% in enterprises. Why? Cost? No. Friction. Users hate carrying a physical token. And that’s the paradox: the safest option feels the most inconvenient.

Authorization: The Hidden Gatekeeper of System Access

Once you’re in, what can you do? That’s authorization. It’s not about entry—it’s about boundaries. Role-Based Access Control (RBAC) is the standard model: your job title determines your permissions. A junior accountant sees payroll data but can’t approve transfers. A system admin can reboot servers but shouldn’t be able to read emails.

But RBAC is rigid. Enter Attribute-Based Access Control (ABAC), which evaluates context—time, location, device, even behavior patterns. A manager logging in from a hotel in Minsk at 3 a.m. might get blocked even if credentials are correct. ABAC is powerful, but complex. One misconfigured policy in AWS led to a data leak at Capital One in 2019—exposing over 100 million customer records. The attacker had a valid IAM role, but the rules allowed metadata access they shouldn’t have had. The issue remains: authorization isn’t just about setting rules. It’s about anticipating edge cases no one thinks to test.

Accounting: The Silent Witness Nobody Pays Attention To

Accounting tracks what users do. Every login. Every file accessed. Every configuration change. Logs are generated, stored, and (ideally) monitored. SIEM systems like Splunk or Microsoft Sentinel aggregate this data, but only if it’s properly formatted and retained. The average enterprise retains logs for 90 days. The mean time to detect a breach? 207 days. See the gap?

And that’s exactly where attackers play the long game. They move slowly, mimicking normal behavior. In the SolarWinds breach, hackers lurked for over 14 months. Their access was authenticated, their actions authorized under compromised admin accounts, and their activities buried in terabytes of routine logs. No alarm. No trace—until it was too late. Accounting isn’t just record-keeping. It’s the forensic trail you’ll wish you’d prioritized when the incident happens. Because when it does, you’ll need to answer: Who did what, when, and how?

Why the 3 A's Are Often Misunderstood in Practice

Most organizations treat the 3 A’s as a compliance checkbox. “We have MFA? Check. RBAC policies? Check. Logs? We’re sending them somewhere.” But security isn’t a form to fill out. It’s a behavior. The real flaw isn’t technical—it’s cultural. Take default admin accounts. In a 2022 study, 37% of SMBs still used default credentials on network devices. That’s like leaving your house key under the mat and calling it “secure because the door locks.”

And then there’s the human factor. Employees share passwords. Contractors keep access after projects end. Temporary permissions? They’re rarely temporary. One tech firm found 22% of active accounts belonged to former employees. That’s not just weak authorization. It’s organizational negligence.

Yet, ironically, over-enforcement breaks systems too. I am convinced that excessive logging can be as dangerous as under-logging. One airline’s system crashed during peak season because audit logs filled up the database—3.2 TB in 48 hours. Transaction rollbacks failed. Flights delayed. The logging was working perfectly. Too perfectly.

Authentication vs Authorization: Clearing the Confusion

People mix these up constantly. Authentication is identity proof. Authorization is permission assignment. You authenticate with your badge at a secure building. You’re authorized to enter only certain floors. Simple. But in digital systems, the layers blur. OAuth, for example, is not an authentication protocol—it’s authorization. Yet it’s often misused as both, leading to vulnerabilities. OpenID Connect was built on top of OAuth to fix this. But adoption is messy.

To give a sense of scale: Microsoft Azure supports 18 identity providers. Each handles authentication differently. But authorization? That’s managed through Azure AD’s role assignments. Decoupling the two improves flexibility—but only if teams understand the difference. And many don’t. A 2023 survey found 41% of junior cloud engineers couldn’t correctly identify which protocol handled which function. That’s a training failure, not a tech one.

Can Zero Trust Replace the 3 A's?

Zero Trust says “never trust, always verify.” It sounds like a replacement for the 3 A’s. It’s not. It’s a framework that relies on them. In fact, Zero Trust demands stronger implementation of each A. Continuous authentication? That’s real-time biometrics or behavioral analytics. Dynamic authorization? Permissions reassessed every few minutes. Persistent accounting? Every micro-interaction logged and analyzed.

But—and this is where we’re far from it—most companies aren’t ready. Legacy systems can’t support real-time identity checks. Budgets are tight. And let’s be clear about this: Zero Trust isn’t a product you buy. It’s a decade-long transformation. NIST’s Zero Trust maturity model spans 5 levels. The average organization? Stuck at level 1.5. So while the 3 A’s are necessary, they’re not sufficient on their own. They’re the foundation—not the roof.

Frequently Asked Questions

What’s the difference between authentication and identification?

Identification is claiming an identity (“I’m John Smith”). Authentication is proving it. You identify with a username. You authenticate with a password, token, or fingerprint. One declares. The other verifies. Mixing them up leads to flawed system design—like allowing login attempts without rate limiting, because “we don’t care who they say they are.” But you should.

Do small businesses need all three A's?

Suffice to say, yes. A 2021 report showed 43% of cyberattacks targeted small businesses. One bakery in Portland lost $28,000 because an employee’s email was compromised—no MFA, no access logs, no way to trace the fraudulent wire transfer. They had none of the 3 A’s. Afterward, they implemented all three. Cost? $1,200 in software and training. Cheaper than the loss.

Can AI improve the 3 A's?

Potentially. AI can spot anomalies in login patterns or detect privilege escalation attempts. But it’s not magic. False positives plague behavioral authentication systems. One company saw 60% of legitimate logins flagged as suspicious during holiday periods—because employees worked odd hours. AI helps, but it needs tuning. Experts disagree on how much autonomy to give it. I find this overrated: fully automated authorization decisions. Humans should still have final say.

The Bottom Line

The 3 A’s aren’t going anywhere. They’re not flashy. They won’t win innovation awards. But they stop breaches. They enable audits. They create accountability. No amount of AI, blockchain, or quantum encryption replaces the need to verify identity, enforce permissions, and keep records. The best security strategy isn’t about adopting the latest trend. It’s about doing the basics—rigorously, consistently, without exception. Because in security, perfection isn’t the goal. Resilience is. And that starts with knowing the difference between who you are, what you can do, and who’s watching. Honestly, it is unclear why more organizations still treat this as optional.

💡 Key Takeaways

  • Is 6 a good height? - The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.
  • Is 172 cm good for a man? - Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately.
  • How much height should a boy have to look attractive? - Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man.
  • Is 165 cm normal for a 15 year old? - The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too.
  • Is 160 cm too tall for a 12 year old? - How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 13

❓ Frequently Asked Questions

1. Is 6 a good height?

The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.

2. Is 172 cm good for a man?

Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately. So, as far as your question is concerned, aforesaid height is above average in both cases.

3. How much height should a boy have to look attractive?

Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man. Dating app Badoo has revealed the most right-swiped heights based on their users aged 18 to 30.

4. Is 165 cm normal for a 15 year old?

The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too. It's a very normal height for a girl.

5. Is 160 cm too tall for a 12 year old?

How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 137 cm to 162 cm tall (4-1/2 to 5-1/3 feet). A 12 year old boy should be between 137 cm to 160 cm tall (4-1/2 to 5-1/4 feet).

6. How tall is a average 15 year old?

Average Height to Weight for Teenage Boys - 13 to 20 Years
Male Teens: 13 - 20 Years)
14 Years112.0 lb. (50.8 kg)64.5" (163.8 cm)
15 Years123.5 lb. (56.02 kg)67.0" (170.1 cm)
16 Years134.0 lb. (60.78 kg)68.3" (173.4 cm)
17 Years142.0 lb. (64.41 kg)69.0" (175.2 cm)

7. How to get taller at 18?

Staying physically active is even more essential from childhood to grow and improve overall health. But taking it up even in adulthood can help you add a few inches to your height. Strength-building exercises, yoga, jumping rope, and biking all can help to increase your flexibility and grow a few inches taller.

8. Is 5.7 a good height for a 15 year old boy?

Generally speaking, the average height for 15 year olds girls is 62.9 inches (or 159.7 cm). On the other hand, teen boys at the age of 15 have a much higher average height, which is 67.0 inches (or 170.1 cm).

9. Can you grow between 16 and 18?

Most girls stop growing taller by age 14 or 15. However, after their early teenage growth spurt, boys continue gaining height at a gradual pace until around 18. Note that some kids will stop growing earlier and others may keep growing a year or two more.

10. Can you grow 1 cm after 17?

Even with a healthy diet, most people's height won't increase after age 18 to 20. The graph below shows the rate of growth from birth to age 20. As you can see, the growth lines fall to zero between ages 18 and 20 ( 7 , 8 ). The reason why your height stops increasing is your bones, specifically your growth plates.