The act of restricting unauthorized people from accessing the infrastructure and assets. Access made by authorized individuals is recorded in the log.