• Securing data in transit and at rest
  • Implementing authentication and authorization