What is logical access?
Logical access in IT is often defined as interactions with hardware via remote access. This type of access generally includes identification, authentication, and authorization protocols. This is often in contrast to the term 'physical access', which refers to interactions with hardware in the physical environment in which devices are stored and used.
Businesses, organizations and other entities use a wide range of logical access controls to protect their hardware from unauthorized remote access. These can include sophisticated password programs, advanced biometric security features, or other setups that effectively identify and display users at any administrative level.
The particular logical access controls used in a given facility and hardware infrastructure depend in part on the type of entity that owns and manages the hardware setup. Government logical access security is often different from logical logical access security, where federal agencies may have specific policies for controlling logical access. Users may need to go through security audits or other verification processes that complement strong passwords or biometric features. This is all part of protecting the data held on a particular hardware facility.