. . . "Current implementations exist to enforce a two man rule in the form of certain roles being assigned to a user by means of an identity and authentication, such as a user ID and password." . .