It is the process of granting or denying particular requests or attempts to:
1) get and make use of the information and related information processing services; and
2) gain access to specific physical facilities.
The list of permissions for an object. The list specifies who or what has permission to access the object and what actions can be taken on it. It is a method for describing, either implicitly or explicitly, the access modes supplied to each system entity in order to implement access control for that resource. The method enumerates the system entities that are allowed to access a system resource.
It refers to high-level requirements specify the access controls that are in place as well as who has access to what data and when.