A set of rules and procedures designed to ensure the integrity, confidentiality, and availability of information and resources within a security system or network.