...
If the application has a higher security risk, step-up authentication needs to be implemented to access high value/risk transactions.
OWASP has an access control cheat sheet where you can find more information about the different types of access control and how to safely implement them.
...