The process of restricting integral components of a system based on user authentication, roles, and permissions.