An organization is designing a new system that will process highly sensitive data. The primary security objective is to prevent any single individual from having end-to-end control over a critical process. Which security principle should be implemented?