Ability to make use of any information system (IS) resource.
Source: NIST SP 800-32

access authority

An entity responsible for monitoring and granting access privileges for other authorized entities.

access control

The process of granting or denying specific requests: 1) for obtaining and using information and related information processing services; and 2) to enter specific physical facilities (e.g., Federal buildings, military establishments, and border crossing entrances).
Source: FIPS PUB 201-1 (adapted)

access control list (ACL)

A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.

access control mechanism

Security safeguards (i.e., hardware and software features, physical controls, operating procedures, management procedures, and various combinations of these) designed to detect and deny unauthorized access and permit authorized access to an information system.

access cross domain solution

A type of cross domain solution (CDS) that provides access to a computing platform, application, or data residing on different security domains from a single device.
Source: CNSSI No. 1253F Attachment 3

access level

A category within a given security classification limiting entry or system connectivity to only authorized persons.

access list

Roster of individuals authorized admittance to a controlled area.

access profile

Association of a user with a list of protected objects the user may access.

access type

Privilege to perform action on an object. Read, write, execute, append, modify, delete, and create are examples of access types.