Using least-access privileges29 and other sound logical access controls to help remediate crimes perpetrated internally. For external threats, sound perimeter controls such as firewalls and Intrusion Detection Systems (IDS) are critical to protection.