Logical Security Control Security Identification and Authentication. Access by follow-up Role/ Individual Access Authorization. Management including SoD