• We recommend protecting physical machines by installing and operating the machines from a protected and controlled environment.
  • Physical access to the both, hardware and software, must be actively supervised and controlled.