When it comes to the cloud, authentication and access controls for service providers and enterprises can ensure that only authorizedusers gain access to cloud-based resources.
For example, security of an endpoint device becomes less of a risk management factor if data is protected and authorizedusers must authenticate their identities to gain access to it.
At the end of 2005, a single consolidated data base of personnel security clearance information was established and is easily accessible by authorizedusers to confirm who already has what clearances.
And in a large corporation or agency, plenty of the documents a leaker might want to exfiltrate are shared among a crowd of users, all of whom have authorized access.
Gmail service offers an option for users to access their email accounts using both a password, and a numerical code separately sent to the authorizeduser's mobile phone.