Make sure that a concept of separation of duties is applied and sensible entry controls and account lockout/disabling controls are in position. Once the network verifies the id, the person logs in. Authorization then decides the extent of entry dependant on network insurance policies. Network security is created up https://ieeexplore.ieee.org/document/9941250