An access path is
|“||[t]he logical route that an end user takes to access computerized information. Typically, it includes the steps taken through the operating system, telecommunications software, software applications and the access control system.||”|
|“||[a] [s]equence of hardware and software components significant to access control. Any component capable of enforcing access restrictions or any component that could be used to bypass an access restriction should be considered part of the access path. The access path can also be defined as the path through which a user request travels, including the telecommunications software, transaction processing software, application program, etc.||”|
- ↑ Auditing and Financial Management: Federal Information System Controls Audit Manual (FISCAM), at 555.