General security considerations

Consider the following information when you are evaluating the security requirements for your environment: