• Security defenses
  • Using access controls to protect your system
  • Protecting authentication
  • Protecting privileged access
  • General security advice