• A Segregation of duties
  • B External roles
  • C Assign users to role
  • D Dormant user security accounts