Reading Time: 2 minutesDiffent products are implementing a security model called “four-eyes principle” (also know as the two-person rule). For example Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.