Make sure that an idea of separation of responsibilities is carried out and logical obtain controls and account lockout/disabling controls are in position. Security orchestration, automation and response solutions collect and evaluate security info and allow security groups to outline and execute automated responses to cyberthreats. Network security is https://ieeexplore.ieee.org/document/9941250