This is usually a means of control normally deployed in key management such that accessing privileged and critical resource requires multiple designated persons to minimize misuse of such privilege by a single person. The simplest form is splitting a password into tokens and held by different persons.
While security control is enforced, there are needs to consider:
– Contingency, e.g. key person(s) is(are) not available in the case of split password. With technology, there is m of n crypto key recovery so that availability of the selected m persons (where m <= n) can regain access
– Further, this assumes all these m persons do not collaborate for malicious act