3.7.1 Protection
Specify the factors that will protect the system from malicious or accidental access, modification, disclosure, destruction, or misuse. For example:
• encryption
• activity logging, historical data sets
• restrictions on intermodule communications
• data integrity checks