Features:* Understanding of the design point for security * Knowledge of the threats in the solution’s operating environment * Utilization of enabling technologies that provide or enforce secure behaviors * Ongoing validation of the secure design