Any access that violates the stated security policy.
Sources:
CNSSI 4009-2015
A person gains logical or physical access without permission to a network, system, application, data, or other resource.
Sources:
NIST SP 800-82r3