• Verifying the security environment.
  • Establishing system connectivity.