In addition to being at the gateways, the strategic
positioning of such control devices/software and tools at
critical hosts and segments of the network can enhance
security further based on requirements determined by the risk
assessment. The operating systems of the servers where critical
resources are hosted need to be hardened and the access
controls in applications also need to be controlled and
maintained securely