Unauthorized or inappropriate access to core systems

Control

Strong authentication controls for networks, servers, and applications