Standards Use authentication protocols: SSH Kerberos OAuth SAML Use PLP Setup Access Control (Type is up to you) Setup user identity (With Smart Card or Biometrics) Setup MFA Setup PAM Setup Audit Trail Conditional Access Policy