26  Security in deployment