Which type of access controls are used to protect an asset before a breach occurs? (Choose all that apply.)