Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential?