Users are authenticated by the system. This helps to maintain a good logging system also.
The RBAC model helps authorization policies to be implemented within the system based on roles of the personnel.
Secure channels use strong encryption which helps confidentiality and data integrity.
Firewall and IDS helps to make the system more secure.
Secure Systems Research Group – Florida Atlantic University