Which of the following methods of access, authentication, and authorization is the MOST secure by default?