Layered Security
We layer multiple security features on top of one another. We enlist current best practices like air-gapped workstation, multi-factor authentication, restricting management traffic to specific locations, certificate based authentication, etc.