Access control system prevents unauthorised access, meaning only approved users, systems, or services can use the resources they want. Access control limits the possibility of a breach by governing who can see or access the data inside the computing environment. It is more than just grant or deny access. This involves identification of the users or systems, authentication of identity to accept access according to predefined rules, and auditing of access logs for monitoring usage. Strong access c