Ensure that an idea of separation of responsibilities is implemented and rational access controls and account lockout/disabling controls are set up. Enforcement considerations examining all network targeted visitors flows and should intention to preserve the confidentiality, integrity, and availability of all systems and data over the network. You should https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network