This is an old revision of the document!
This section is derived from good practice guide of security.