The identities and credentials of users, services, and authorized hardware are managed by the organization.
Users, services, and hardware are authenticated.
Permissions, rights, and access authorizations are defined in a policy, managed, enforced, reviewed, and incorporate the principles of least privilege and separation of duties.
Physical access to assets is managed, monitored, and enforced appropriately to the risk.