Security strategy based on the concept that individuals who have permission to enter an area can enter it. The aim is to prevent unauthorized access to organizational systems like computer devices and laptops situated within the restricted physical space.