Component Security

Each application software component often has its own security considerations that you can evaluate independently of those that apply to the OS. See the security guidelines for each component to decide how best to configure it to fit the security requirements for each environment.