/ revoking privileged access to all multi-user information assets including Operating Systems, Infrastructure Applications.... Which would include processes, procedures, standards, workflows and steps required to maintain and minimize security impacts...