Reading Time: 2 minutesDiffent products are implementing a security model called “four-eyes principle“, also know as the two-person rule or also multi-user authorization (MUA). In the backup and data protection are, for example, Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.