Page 24. IT should be aware of the asset, user, geolocation and cyber hygienic health of the computing device before access is granted; again, regardless of privileges.