Protective measures for C-I-A
Identity and Access Management
SSO, OAuth, SAML, and OIDC
Electronic methods to restrict access
Tangible security measures
Implementing Principle of Least Privilege