Encryption and SignaturesAccountability and NonrepudiationIdentification and AuthenticationAuthorizationRole-Based Access Control, ExtendedRuntime AuthorizationXACML PoliciesAccess Control AdministrationFederation of Trust DomainsPerimeter securityVulnerability Scanning and Intrusion DetectionMonitoring, Logging, Alerts, and Audits