Employ automated mechanisms to integrate intrusion detection mechanisms into access control mechanisms.