https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_Ref...
This is called "security through compartmentalization", i.e., you don't trust one single entity. The only approach that works.