You will need MAC if you have to implement auditing or stronger security. Basically with MAC a security administrator can define that even the owner of an object cannot to everything with his object. Usually this requirement arises in highly security sensitive areas like military, governmental or core business services.
|