Proper use of encryption and key management.

User responsibilities and managing system/application access.

Management direction for security.