MDM system utilized

Employee background checks performed

Anti-malware technology utilized

Portable media encrypted

Firewall access restricted

Unique network system authentication enforced

Network segmentation implemented

Log management utilized

Access control procedures established

Production application access restricted