Information security practice to manage and audit network access based on the user’s job roles in the organizational hierarchy.