means to ensure that physical and logical access to asset is authorized and restricted based on business and information security requirements