• Data Encryption
  • Authentication
  • Role-Based Access Control