Using what you have learned about access controls, identify the business impact of the challenge, and identify an access control method that will mitigate the impact to the business.