Vulnerability and system monitoring procedures established

System activity logged

Data transmission encrypted

Penetration testing performed