Protective measures for C-I-A
Identity and Access Management
Electronic methods to restrict access
Tangible security measures
Implementing Principle of Least Privilege