In a MAC system, an operating system provides individual users with access based on data confidentiality and levels of user clearance. MAC is the strictest of all models. Access is granted on a strict,need-to-know basis. Users must prove they need the requested information or access before gaining permission.